lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024072927-CVE-2024-41049-bf28@gregkh>
Date: Mon, 29 Jul 2024 16:32:44 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-41049: filelock: fix potential use-after-free in posix_lock_inode

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

filelock: fix potential use-after-free in posix_lock_inode

Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().
The request pointer had been changed earlier to point to a lock entry
that was added to the inode's list. However, before the tracepoint could
fire, another task raced in and freed that lock.

Fix this by moving the tracepoint inside the spinlock, which should
ensure that this doesn't happen.

The Linux kernel CVE team has assigned CVE-2024-41049 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 5.4.257 with commit 117fb80cd1e6 and fixed in 5.4.280 with commit 1cbbb3d9475c
	Issue introduced in 5.10.197 with commit a6f4129378ca and fixed in 5.10.222 with commit 7d4c14f4b511
	Issue introduced in 5.15.133 with commit 766e56faddbe and fixed in 5.15.163 with commit 02a896426075
	Issue introduced in 6.1.55 with commit 34bff6d85001 and fixed in 6.1.100 with commit 5cb36e35bc10
	Issue introduced in 6.6 with commit 74f6f5912693 and fixed in 6.6.41 with commit 432b06b69d1d
	Issue introduced in 6.6 with commit 74f6f5912693 and fixed in 6.9.10 with commit 116599f6a269
	Issue introduced in 6.6 with commit 74f6f5912693 and fixed in 6.10 with commit 1b3ec4f7c03d
	Issue introduced in 6.5.5 with commit e75396988bb9

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2024-41049
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	fs/locks.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197
	https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b
	https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967
	https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0
	https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a
	https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2
	https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ