In the Linux kernel, the following vulnerability has been resolved:
erofs: reliably distinguish block based and fscache mode
When erofs_kill_sb() is called in block dev based mode, s_bdev may not
have been initialised yet, and if CONFIG_EROFS_FS_ONDEMAND is enabled,
it will be mistaken for fscache mode, and then attempt to free an anon_dev
that has never been allocated, triggering the following warning:
============================================
ida_free called for id=0 which is not allocated.
WARNING: CPU: 14 PID: 926 at lib/idr.c:525 ida_free+0x134/0x140
Modules linked in:
CPU: 14 PID: 926 Comm: mount Not tainted 6.9.0-rc3-dirty #630
RIP: 0010:ida_free+0x134/0x140
Call Trace:
<TASK>
erofs_kill_sb+0x81/0x90
deactivate_locked_super+0x35/0x80
get_tree_bdev+0x136/0x1e0
vfs_get_tree+0x2c/0xf0
do_new_mount+0x190/0x2f0
[...]
============================================
Now when erofs_kill_sb() is called, erofs_sb_info must have been
initialised, so use sbi->fsid to distinguish between the two modes.
References
Configurations
Configuration 1 (hide)
|
History
01 Oct 2025, 14:43
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-824 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/7af2ae1b1531feab5d38ec9c8f472dc6cceb4606 - Patch | |
References | () https://git.kernel.org/stable/c/dcdd49701e429c55b3644fd70fc58d85745f8cfe - Patch | |
References | () https://git.kernel.org/stable/c/f9b877a7ee312ec8ce17598a7ef85cb820d7c371 - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/7af2ae1b1531feab5d38ec9c8f472dc6cceb4606 - | |
References | () https://git.kernel.org/stable/c/dcdd49701e429c55b3644fd70fc58d85745f8cfe - | |
References | () https://git.kernel.org/stable/c/f9b877a7ee312ec8ce17598a7ef85cb820d7c371 - | |
Summary |
|
08 Jun 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-08 13:15
Updated : 2025-10-01 14:43
NVD link : CVE-2024-36966
Mitre link : CVE-2024-36966
CVE.ORG link : CVE-2024-36966
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-824
Access of Uninitialized Pointer