In the Linux kernel, the following vulnerability has been resolved:
landlock: Fix d_parent walk
The WARN_ON_ONCE() in collect_domain_accesses() can be triggered when
trying to link a root mount point. This cannot work in practice because
this directory is mounted, but the VFS check is done after the call to
security_path_link().
Do not use source directory's d_parent when the source directory is the
mount point.
[mic: Fix commit message]
References
Configurations
Configuration 1 (hide)
|
History
06 Oct 2025, 20:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc - Patch | |
References | () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f - Patch | |
References | () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 - Patch | |
References | () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc - | |
References | () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f - | |
References | () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 - | |
References | () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 - | |
Summary |
|
12 Jul 2024, 16:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-12 13:15
Updated : 2025-10-06 20:51
NVD link : CVE-2024-40938
Mitre link : CVE-2024-40938
CVE.ORG link : CVE-2024-40938
JSON object : View
Products Affected
linux
- linux_kernel
CWE