Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-41012— filelock: Remove locks reliably when fcntl/close race is detected

EPSS 0.01% · P2

Affected Version Matrix 18

VendorProductVersion RangeStatus
LinuxLinuxc293621bbf678a3d85e3ed721c3921c8a670610d< d30ff33040834c3b9eee29740acd92f9c7ba2250affected
c293621bbf678a3d85e3ed721c3921c8a670610d< dc2ce1dfceaa0767211a9d963ddb029ab21c4235affected
c293621bbf678a3d85e3ed721c3921c8a670610d< 5661b9c7ec189406c2dde00837aaa4672efb6240affected
c293621bbf678a3d85e3ed721c3921c8a670610d< 52c87ab18c76c14d7209646ccb3283b3f5d87b22affected
c293621bbf678a3d85e3ed721c3921c8a670610d< ef8fc41cd6f95f9a4a3470f085aecf350569a0b3affected
c293621bbf678a3d85e3ed721c3921c8a670610d< 5f5d0799eb0a01d550c21b7894e26b2d9db55763affected
c293621bbf678a3d85e3ed721c3921c8a670610d< b6d223942c34057fdfd8f149e763fa823731b224affected
c293621bbf678a3d85e3ed721c3921c8a670610d< 3cad1bc010416c6dd780643476bc59ed742436b9affected
… +10 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-41012

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
filelock: Remove locks reliably when fcntl/close race is detected
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: filelock: Remove locks reliably when fcntl/close race is detected When fcntl_setlk() races with close(), it removes the created lock with do_lock_file_wait(). However, LSMs can allow the first do_lock_file_wait() that created the lock while denying the second do_lock_file_wait() that tries to remove the lock. Separately, posix_lock_file() could also fail to remove a lock due to GFP_KERNEL allocation failure (when splitting a range in the middle). After the bug has been triggered, use-after-free reads will occur in lock_get_status() when userspace reads /proc/locks. This can likely be used to read arbitrary kernel memory, but can't corrupt kernel memory. Fix it by calling locks_remove_posix() instead, which is designed to reliably get rid of POSIX locks associated with the given file and files_struct and is also used by filp_flush().
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于 filelock 模块中,当 fcntl_setlk 函数与 close 函数竞争时,会使用 do_lock_file_wait 函数移除创建的锁。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux c293621bbf678a3d85e3ed721c3921c8a670610d ~ d30ff33040834c3b9eee29740acd92f9c7ba2250 -
LinuxLinux 2.6.13 -

II. Public POCs for CVE-2024-41012

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-41012

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-41012

No comments yet


Leave a comment