CVE-2024-40938

In the Linux kernel, the following vulnerability has been resolved: landlock: Fix d_parent walk The WARN_ON_ONCE() in collect_domain_accesses() can be triggered when trying to link a root mount point. This cannot work in practice because this directory is mounted, but the VFS check is done after the call to security_path_link(). Do not use source directory's d_parent when the source directory is the mount point. [mic: Fix commit message]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*

History

06 Oct 2025, 20:51

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc - () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc - Patch
References () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f - () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f - Patch
References () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 - () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 - Patch
References () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 - () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:31

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc - () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc -
References () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f - () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f -
References () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 - () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 -
References () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 - () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: landlock: Fix d_parent walk WARN_ON_ONCE() en Collect_domain_accesses() se puede activar al intentar vincular un punto de montaje raíz. Esto no puede funcionar en la práctica porque este directorio está montado, pero la verificación de VFS se realiza después de llamar a security_path_link(). No utilice d_parent del directorio de origen cuando el directorio de origen sea el punto de montaje. [micrófono: Arreglar mensaje de confirmación]

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-10-06 20:51


NVD link : CVE-2024-40938

Mitre link : CVE-2024-40938

CVE.ORG link : CVE-2024-40938


JSON object : View

Products Affected

linux

  • linux_kernel