In the Linux kernel, the following vulnerability has been resolved:
ima: Fix use-after-free on a dentry's dname.name
->d_name.name can change on rename and the earlier value can be freed;
there are conditions sufficient to stabilize it (->d_lock on dentry,
->d_lock on its parent, ->i_rwsem exclusive on the parent's inode,
rename_lock), but none of those are met at any of the sites. Take a stable
snapshot of the name instead.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-12 13:15
Updated : 2024-07-24 19:17
NVD link : CVE-2024-39494
Mitre link : CVE-2024-39494
CVE.ORG link : CVE-2024-39494
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free