First published: Mon Jul 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode's list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn't happen.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.4.280 | 5.4.280 |
redhat/kernel | <5.10.222 | 5.10.222 |
redhat/kernel | <5.15.163 | 5.15.163 |
redhat/kernel | <6.1.100 | 6.1.100 |
redhat/kernel | <6.6.41 | 6.6.41 |
redhat/kernel | <6.9.10 | 6.9.10 |
redhat/kernel | <6.10 | 6.10 |
Linux Kernel | >=5.4.257<5.4.280 | |
Linux Kernel | >=5.10.197<5.10.222 | |
Linux Kernel | >=5.15.133<5.15.163 | |
Linux Kernel | >=6.1.55<6.1.100 | |
Linux Kernel | >=6.6<6.6.41 | |
Linux Kernel | >=6.7<6.9.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 | |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41049 has a high severity rating due to the potential for a use-after-free vulnerability in the Linux kernel.
To fix CVE-2024-41049, update your Linux kernel to version 5.4.280, 5.10.222, 5.15.163, 6.1.100, 6.6.41, 6.9.10, or 6.10.
CVE-2024-41049 affects Linux systems running kernel versions prior to 5.4.280, 5.10.222, 5.15.163, 6.1.100, 6.6.41, 6.9.10, and 6.10.
CVE-2024-41049 was reported by Light Hsieh as a KASAN use-after-free warning.
CVE-2024-41049 is a use-after-free vulnerability that affects the file locking mechanism in the Linux kernel.