CVE-2024-53173

In the Linux kernel, the following vulnerability has been resolved: NFSv4.0: Fix a use-after-free problem in the asynchronous open() Yang Erkun reports that when two threads are opening files at the same time, and are forced to abort before a reply is seen, then the call to nfs_release_seqid() in nfs4_opendata_free() can result in a use-after-free of the pointer to the defunct rpc task of the other thread. The fix is to ensure that if the RPC call is aborted before the call to nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid() in nfs4_open_release() before the rpc_task is freed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Jan 2025, 17:11

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1cfae9575296f5040cdc84b0730e79078c081d2d - () https://git.kernel.org/stable/c/1cfae9575296f5040cdc84b0730e79078c081d2d - Patch
References () https://git.kernel.org/stable/c/229a30ed42bb87bcb044c5523fabd9e4f0e75648 - () https://git.kernel.org/stable/c/229a30ed42bb87bcb044c5523fabd9e4f0e75648 - Patch
References () https://git.kernel.org/stable/c/2ab9639f16b05d948066a6c4cf19a0fdc61046ff - () https://git.kernel.org/stable/c/2ab9639f16b05d948066a6c4cf19a0fdc61046ff - Patch
References () https://git.kernel.org/stable/c/2fdb05dc0931250574f0cb0ebeb5ed8e20f4a889 - () https://git.kernel.org/stable/c/2fdb05dc0931250574f0cb0ebeb5ed8e20f4a889 - Patch
References () https://git.kernel.org/stable/c/5237a297ffd374a1c4157a53543b7a69d7bbbc03 - () https://git.kernel.org/stable/c/5237a297ffd374a1c4157a53543b7a69d7bbbc03 - Patch
References () https://git.kernel.org/stable/c/7bf6bf130af8ee7d93a99c28a7512df3017ec759 - () https://git.kernel.org/stable/c/7bf6bf130af8ee7d93a99c28a7512df3017ec759 - Patch
References () https://git.kernel.org/stable/c/b56ae8e715557b4fc227c9381d2e681ffafe7b15 - () https://git.kernel.org/stable/c/b56ae8e715557b4fc227c9381d2e681ffafe7b15 - Patch
References () https://git.kernel.org/stable/c/ba6e6c04f60fe52d91520ac4d749d372d4c74521 - () https://git.kernel.org/stable/c/ba6e6c04f60fe52d91520ac4d749d372d4c74521 - Patch
References () https://git.kernel.org/stable/c/e2277a1d9d5cd0d625a4fd7c04fce2b53e66df77 - () https://git.kernel.org/stable/c/e2277a1d9d5cd0d625a4fd7c04fce2b53e66df77 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSv4.0: Se corrige un problema de use-after-free en la función open() asincrónica Yang Erkun informa que cuando dos subprocesos abren archivos al mismo tiempo y se ven obligados a abortar antes de que se vea una respuesta, la llamada a nfs_release_seqid() en nfs4_opendata_free() puede dar como resultado un use-after-free del puntero a la tarea rpc inactiva del otro subproceso. La solución es garantizar que si la llamada RPC se aborta antes de que se complete la llamada a nfs_wait_on_sequence(), entonces debemos llamar a nfs_release_seqid() en nfs4_open_release() antes de que se libere la rpc_task.
First Time Linux linux Kernel
Linux
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Dec 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 14:15

Updated : 2025-02-11 16:15


NVD link : CVE-2024-53173

Mitre link : CVE-2024-53173

CVE.ORG link : CVE-2024-53173


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free