CVE-2024-41049 (GCVE-0-2024-41049)
Vulnerability from cvelistv5
Published
2024-07-29 14:32
Modified
2025-11-03 21:59
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: filelock: fix potential use-after-free in posix_lock_inode Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode(). The request pointer had been changed earlier to point to a lock entry that was added to the inode's list. However, before the tracepoint could fire, another task raced in and freed that lock. Fix this by moving the tracepoint inside the spinlock, which should ensure that this doesn't happen.
Impacted products
Vendor Product Version
Linux Linux Version: 117fb80cd1e63c419c7a221ce070becb4bfc7b6d
Version: a6f4129378ca15f62cbdde09a7d3ccc35adcf49d
Version: 766e56faddbec2eaf70c9299e1c9ef74d846d32b
Version: 34bff6d850019e00001129d6de3aa4874c2cf471
Version: 74f6f5912693ce454384eaeec48705646a21c74f
Version: 74f6f5912693ce454384eaeec48705646a21c74f
Version: 74f6f5912693ce454384eaeec48705646a21c74f
Version: e75396988bb9b3b90e6e8690604d0f566cea403a
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T21:59:49.896Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41049",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:22:47.848280Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:01.912Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/locks.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "1cbbb3d9475c403ebedc327490c7c2b991398197",
              "status": "affected",
              "version": "117fb80cd1e63c419c7a221ce070becb4bfc7b6d",
              "versionType": "git"
            },
            {
              "lessThan": "7d4c14f4b511fd4c0dc788084ae59b4656ace58b",
              "status": "affected",
              "version": "a6f4129378ca15f62cbdde09a7d3ccc35adcf49d",
              "versionType": "git"
            },
            {
              "lessThan": "02a8964260756c70b20393ad4006948510ac9967",
              "status": "affected",
              "version": "766e56faddbec2eaf70c9299e1c9ef74d846d32b",
              "versionType": "git"
            },
            {
              "lessThan": "5cb36e35bc10ea334810937990c2b9023dacb1b0",
              "status": "affected",
              "version": "34bff6d850019e00001129d6de3aa4874c2cf471",
              "versionType": "git"
            },
            {
              "lessThan": "432b06b69d1d354a171f7499141116536579eb6a",
              "status": "affected",
              "version": "74f6f5912693ce454384eaeec48705646a21c74f",
              "versionType": "git"
            },
            {
              "lessThan": "116599f6a26906cf33f67975c59f0692ecf7e9b2",
              "status": "affected",
              "version": "74f6f5912693ce454384eaeec48705646a21c74f",
              "versionType": "git"
            },
            {
              "lessThan": "1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92",
              "status": "affected",
              "version": "74f6f5912693ce454384eaeec48705646a21c74f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "e75396988bb9b3b90e6e8690604d0f566cea403a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/locks.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.6"
            },
            {
              "lessThan": "6.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.280",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.222",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.163",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.100",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.41",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.280",
                  "versionStartIncluding": "5.4.257",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.222",
                  "versionStartIncluding": "5.10.197",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.163",
                  "versionStartIncluding": "5.15.133",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.100",
                  "versionStartIncluding": "6.1.55",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.41",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9.10",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10",
                  "versionStartIncluding": "6.6",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "6.5.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfilelock: fix potential use-after-free in posix_lock_inode\n\nLight Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().\nThe request pointer had been changed earlier to point to a lock entry\nthat was added to the inode\u0027s list. However, before the tracepoint could\nfire, another task raced in and freed that lock.\n\nFix this by moving the tracepoint inside the spinlock, which should\nensure that this doesn\u0027t happen."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T12:57:32.138Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197"
        },
        {
          "url": "https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b"
        },
        {
          "url": "https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967"
        },
        {
          "url": "https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0"
        },
        {
          "url": "https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a"
        },
        {
          "url": "https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2"
        },
        {
          "url": "https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92"
        }
      ],
      "title": "filelock: fix potential use-after-free in posix_lock_inode",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-41049",
    "datePublished": "2024-07-29T14:32:05.953Z",
    "dateReserved": "2024-07-12T12:17:45.625Z",
    "dateUpdated": "2025-11-03T21:59:49.896Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:46:52.373Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41049\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:22:47.848280Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:20.269Z\"}}], \"cna\": {\"title\": \"filelock: fix potential use-after-free in posix_lock_inode\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"117fb80cd1e6\", \"lessThan\": \"1cbbb3d9475c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"a6f4129378ca\", \"lessThan\": \"7d4c14f4b511\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"766e56faddbe\", \"lessThan\": \"02a896426075\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"34bff6d85001\", \"lessThan\": \"5cb36e35bc10\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"74f6f5912693\", \"lessThan\": \"432b06b69d1d\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"74f6f5912693\", \"lessThan\": \"116599f6a269\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"74f6f5912693\", \"lessThan\": \"1b3ec4f7c03d\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/locks.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.6\", \"versionType\": \"custom\"}, {\"status\": \"unaffected\", \"version\": \"5.4.280\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.222\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.163\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.100\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.41\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.10\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/locks.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/1cbbb3d9475c403ebedc327490c7c2b991398197\"}, {\"url\": \"https://git.kernel.org/stable/c/7d4c14f4b511fd4c0dc788084ae59b4656ace58b\"}, {\"url\": \"https://git.kernel.org/stable/c/02a8964260756c70b20393ad4006948510ac9967\"}, {\"url\": \"https://git.kernel.org/stable/c/5cb36e35bc10ea334810937990c2b9023dacb1b0\"}, {\"url\": \"https://git.kernel.org/stable/c/432b06b69d1d354a171f7499141116536579eb6a\"}, {\"url\": \"https://git.kernel.org/stable/c/116599f6a26906cf33f67975c59f0692ecf7e9b2\"}, {\"url\": \"https://git.kernel.org/stable/c/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92\"}], \"x_generator\": {\"engine\": \"bippy-c9c4e1df01b2\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfilelock: fix potential use-after-free in posix_lock_inode\\n\\nLight Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().\\nThe request pointer had been changed earlier to point to a lock entry\\nthat was added to the inode\u0027s list. However, before the tracepoint could\\nfire, another task raced in and freed that lock.\\n\\nFix this by moving the tracepoint inside the spinlock, which should\\nensure that this doesn\u0027t happen.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-07-29T14:32:05.953Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-41049\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-11T17:34:01.912Z\", \"dateReserved\": \"2024-07-12T12:17:45.625Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-29T14:32:05.953Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…