In the Linux kernel, the following vulnerability has been resolved:
ima: Fix use-after-free on a dentry's dname.name
->d_name.name can change on rename and the earlier value can be freed;
there are conditions sufficient to stabilize it (->d_lock on dentry,
->d_lock on its parent, ->i_rwsem exclusive on the parent's inode,
rename_lock), but none of those are met at any of the sites. Take a stable
snapshot of the name instead.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-12 13:15
Updated : 2026-01-06 15:06
NVD link : CVE-2024-39494
Mitre link : CVE-2024-39494
CVE.ORG link : CVE-2024-39494
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free
