btrfs:zoned:修复由于与 dev replace 竞争而导致的 use-after-free 问题(CVE-2024-39496)

admin 2024-07-15 16:29:23 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
btrfs:zoned:修复由于与 dev replace 竞争而导致的 use-after-free 问题(CVE-2024-39496)

CVE编号

CVE-2024-39496

利用情况

暂无

补丁情况

N/A

披露时间

2024-07-12
漏洞描述
In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a zone's info during creation of a block group, we can race with a device replace operation and then trigger a use-after-free on the device that was just replaced (source device of the replace operation). This happens because at btrfs_load_zone_info() we extract a device from the chunk map into a local variable and then use the device while not under the protection of the device replace rwsem. So if there's a device replace operation happening when we extract the device and that device is the source of the replace operation, we will trigger a use-after-free if before we finish using the device the replace operation finishes and frees the device. Fix this by enlarging the critical section under the protection of the device replace rwsem so that all uses of the device are done inside the critical section.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://git.kernel.org/stable/c/0090d6e1b210551e63cf43958dc7a1ec942cdde9
https://git.kernel.org/stable/c/092571ef9a812566c8f2c9038d9c2a64c49788d6
https://git.kernel.org/stable/c/17765964703b88d8befd899f8501150bb7e07e43
https://git.kernel.org/stable/c/a0cc006f4214b87e70983c692e05bb36c59b5752
CVSS3评分 N/A
  • 攻击路径 N/A
  • 攻击复杂度 N/A
  • 权限要求 N/A
  • 影响范围 N/A
  • 用户交互 N/A
  • 可用性 N/A
  • 保密性 N/A
  • 完整性 N/A
N/A
CWE-ID 漏洞类型
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0