Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-45003 | First vendor Publication | 2024-09-04 |
Vendor | Cve | Last vendor Modification | 2024-11-05 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 4.7 | ||
Base Score | 4.7 | Environmental Score | 4.7 |
impact SubScore | 3.6 | Temporal Score | 4.7 |
Exploitabality Sub Score | 1 | ||
Attack Vector | Local | Attack Complexity | High |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the Linux kernel, the following vulnerability has been resolved: vfs: Don't evict inode under the inode lru traversing context The inode reclaiming process(See function prune_icache_sb) collects all reclaimable inodes and mark them with I_FREEING flag at first, at that time, other processes will be stuck if they try getting these inodes (See function find_inode_fast), then the reclaiming process destroy the inodes by function dispose_list(). Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen. Case 1: In function ext4_evict_inode(), the ea inode lookup could happen 1. File A has inode i_reg and an ea inode i_ea PA PB Case 2: In deleted inode writing function ubifs_jnl_write_inode(), file 1. File A has inode ia and a xattr(with inode ixa), regular file B has PA PB PC Fix the possible deadlock by using new inode state flag I_LRU_ISOLATING to pin the inode in memory while inode_lru_isolate( ---truncated--- |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-667 | Insufficient Locking |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-01-08 03:04:58 |
|
2025-01-07 03:04:31 |
|
2024-12-25 03:03:09 |
|
2024-12-12 03:06:05 |
|
2024-11-23 03:03:06 |
|
2024-11-22 03:01:16 |
|
2024-11-20 02:59:36 |
|
2024-11-13 21:21:59 |
|
2024-11-09 00:28:26 |
|
2024-11-05 13:27:50 |
|
2024-10-26 02:57:18 |
|
2024-10-25 02:59:11 |
|
2024-10-23 02:58:22 |
|
2024-10-09 21:27:49 |
|
2024-09-16 00:27:31 |
|
2024-09-05 17:27:24 |
|
2024-09-05 00:27:25 |
|