In the Linux kernel, the following vulnerability has been resolved:
cachefiles: add consistency check for copen/cread
This prevents malicious processes from completing random copen/cread
requests and crashing the system. Added checks are listed below:
* Generic, copen can only complete open requests, and cread can only
complete read requests.
* For copen, ondemand_id must not be 0, because this indicates that the
request has not been read by the daemon.
* For cread, the object corresponding to fd and req should be the same.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 19 Aug 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-99 | |
Metrics |
threat_severity
|
threat_severity
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-07-29T14:57:34.891Z
Updated: 2024-11-05T09:36:13.917Z
Reserved: 2024-07-12T12:17:45.632Z
Link: CVE-2024-41075
Vulnrichment
Updated: 2024-08-02T04:46:52.518Z
NVD
Status : Awaiting Analysis
Published: 2024-07-29T15:15:15.163
Modified: 2024-07-29T16:21:52.517
Link: CVE-2024-41075
Redhat