CVE-2024-38580

In the Linux kernel, the following vulnerability has been resolved: epoll: be better about file lifetimes epoll can call out to vfs_poll() with a file pointer that may race with the last 'fput()'. That would make f_count go down to zero, and while the ep->mtx locking means that the resulting file pointer tear-down will be blocked until the poll returns, it means that f_count is already dead, and any use of it won't actually get a reference to the file any more: it's dead regardless. Make sure we have a valid ref on the file pointer before we call down to vfs_poll() from the epoll routines.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*

History

20 Oct 2025, 22:09

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
References () https://git.kernel.org/stable/c/16e3182f6322575eb7c12e728ad3c7986a189d5d - () https://git.kernel.org/stable/c/16e3182f6322575eb7c12e728ad3c7986a189d5d - Patch
References () https://git.kernel.org/stable/c/4efaa5acf0a1d2b5947f98abb3acf8bfd966422b - () https://git.kernel.org/stable/c/4efaa5acf0a1d2b5947f98abb3acf8bfd966422b - Patch
References () https://git.kernel.org/stable/c/4f65f4defe4e23659275ce5153541cd4f76ce2d2 - () https://git.kernel.org/stable/c/4f65f4defe4e23659275ce5153541cd4f76ce2d2 - Patch
References () https://git.kernel.org/stable/c/559214eb4e5c3d05e69428af2fae2691ba1eb784 - () https://git.kernel.org/stable/c/559214eb4e5c3d05e69428af2fae2691ba1eb784 - Patch
References () https://git.kernel.org/stable/c/cbfd1088e24ec4c1199756a37cb8e4cd0a4b016e - () https://git.kernel.org/stable/c/cbfd1088e24ec4c1199756a37cb8e4cd0a4b016e - Patch
CWE NVD-CWE-noinfo

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/16e3182f6322575eb7c12e728ad3c7986a189d5d - () https://git.kernel.org/stable/c/16e3182f6322575eb7c12e728ad3c7986a189d5d -
References () https://git.kernel.org/stable/c/4efaa5acf0a1d2b5947f98abb3acf8bfd966422b - () https://git.kernel.org/stable/c/4efaa5acf0a1d2b5947f98abb3acf8bfd966422b -
References () https://git.kernel.org/stable/c/4f65f4defe4e23659275ce5153541cd4f76ce2d2 - () https://git.kernel.org/stable/c/4f65f4defe4e23659275ce5153541cd4f76ce2d2 -
References () https://git.kernel.org/stable/c/559214eb4e5c3d05e69428af2fae2691ba1eb784 - () https://git.kernel.org/stable/c/559214eb4e5c3d05e69428af2fae2691ba1eb784 -
References () https://git.kernel.org/stable/c/cbfd1088e24ec4c1199756a37cb8e4cd0a4b016e - () https://git.kernel.org/stable/c/cbfd1088e24ec4c1199756a37cb8e4cd0a4b016e -

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: epoll: mejore la duración de los archivos epoll puede llamar a vfs_poll() con un puntero de archivo que puede competir con el último 'fput()'. Eso haría que f_count bajara a cero, y aunque el bloqueo ep->mtx significa que el desmontaje del puntero del archivo resultante se bloqueará hasta que regrese la encuesta, significa que f_count ya está muerto y no se podrá utilizar. De hecho, ya no obtengo una referencia al archivo: está muerto de todos modos. Asegúrese de tener una referencia válida en el puntero del archivo antes de llamar a vfs_poll() desde las rutinas de epoll.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2025-10-20 22:09


NVD link : CVE-2024-38580

Mitre link : CVE-2024-38580

CVE.ORG link : CVE-2024-38580


JSON object : View

Products Affected

linux

  • linux_kernel