CVE-2024-40956

In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list Use list_for_each_entry_safe() to allow iterating through the list and deleting the entry in the iteration process. The descriptor is freed via idxd_desc_complete() and there's a slight chance may cause issue for the list iterator when the descriptor is reused by another thread without it being deleted from the list.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

History

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33 - Patch () https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33 - Patch
References () https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5 - Patch () https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5 - Patch
References () https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd - Patch () https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd - Patch
References () https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7 - Patch () https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7 - Patch
References () https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8 - Patch () https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8 - Patch

28 Aug 2024, 18:58

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: corrija posible Use-After-Free en irq_process_work_list Use list_for_each_entry_safe() para permitir iterar a través de la lista y eliminar la entrada en el proceso de iteración. El descriptor se libera a través de idxd_desc_complete() y existe una pequeña posibilidad de que cause problemas para el iterador de la lista cuando otro subproceso reutiliza el descriptor sin que se elimine de la lista.
References () https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33 - () https://git.kernel.org/stable/c/1b08bf5a17c66ab7dbb628df5344da53c8e7ab33 - Patch
References () https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5 - () https://git.kernel.org/stable/c/83163667d881100a485b6c2daa30301b7f68d9b5 - Patch
References () https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd - () https://git.kernel.org/stable/c/a14968921486793f2a956086895c3793761309dd - Patch
References () https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7 - () https://git.kernel.org/stable/c/e3215deca4520773cd2b155bed164c12365149a7 - Patch
References () https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8 - () https://git.kernel.org/stable/c/faa35db78b058a2ab6e074ee283f69fa398c36a8 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*

12 Jul 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2024-11-21 09:31


NVD link : CVE-2024-40956

Mitre link : CVE-2024-40956

CVE.ORG link : CVE-2024-40956


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free