CVE-2024-39494

In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on rename and the earlier value can be freed; there are conditions sufficient to stabilize it (->d_lock on dentry, ->d_lock on its parent, ->i_rwsem exclusive on the parent's inode, rename_lock), but none of those are met at any of the sites. Take a stable snapshot of the name instead.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/480afcbeb7aaaa22677d3dd48ec590b441eaac1a -
  • () https://git.kernel.org/stable/c/edf287bc610b18d7a9c0c0c1cb2e97b9348c71bb -

14 Dec 2024, 21:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/0b31e28fbd773aefb6164687e0767319b8199829 -

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/7fb374981e31c193b1152ed8d3b0a95b671330d4 - Patch () https://git.kernel.org/stable/c/7fb374981e31c193b1152ed8d3b0a95b671330d4 - Patch
References () https://git.kernel.org/stable/c/a78a6f0da57d058e2009e9958fdcef66f165208c - Patch () https://git.kernel.org/stable/c/a78a6f0da57d058e2009e9958fdcef66f165208c - Patch
References () https://git.kernel.org/stable/c/be84f32bb2c981ca670922e047cdde1488b233de - Patch () https://git.kernel.org/stable/c/be84f32bb2c981ca670922e047cdde1488b233de - Patch
References () https://git.kernel.org/stable/c/dd431c3ac1fc34a9268580dd59ad3e3c76b32a8c - Patch () https://git.kernel.org/stable/c/dd431c3ac1fc34a9268580dd59ad3e3c76b32a8c - Patch

24 Jul 2024, 19:17

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/7fb374981e31c193b1152ed8d3b0a95b671330d4 - () https://git.kernel.org/stable/c/7fb374981e31c193b1152ed8d3b0a95b671330d4 - Patch
References () https://git.kernel.org/stable/c/a78a6f0da57d058e2009e9958fdcef66f165208c - () https://git.kernel.org/stable/c/a78a6f0da57d058e2009e9958fdcef66f165208c - Patch
References () https://git.kernel.org/stable/c/be84f32bb2c981ca670922e047cdde1488b233de - () https://git.kernel.org/stable/c/be84f32bb2c981ca670922e047cdde1488b233de - Patch
References () https://git.kernel.org/stable/c/dd431c3ac1fc34a9268580dd59ad3e3c76b32a8c - () https://git.kernel.org/stable/c/dd431c3ac1fc34a9268580dd59ad3e3c76b32a8c - Patch
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: ima: corrige el use-after-free en dentry dname.name ->d_name.name puede cambiar al cambiar el nombre y el valor anterior se puede liberar; existen condiciones suficientes para estabilizarlo (->d_lock on dentry, ->d_lock on its parent, ->i_rwsem exclusivo en el inodo del padre, rename_lock), pero ninguna de ellas se cumple en ninguno de los sitios. En su lugar, tome una instantánea estable del nombre.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
First Time Linux
Linux linux Kernel

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-03-13 13:15


NVD link : CVE-2024-39494

Mitre link : CVE-2024-39494

CVE.ORG link : CVE-2024-39494


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free