CVE-2024-41049

Updated: 2024-11-30 03:54:38.485531

Description:

In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode's list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn't happen.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2024:1731933167 2024-11-18 16:33:51
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH Released CLSA-2024:1731956568 2024-11-18 16:29:30
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Not Vulnerable 2024-09-16 12:25:28
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Not Vulnerable 2024-09-16 12:25:28