CVE-2024-27389

In the Linux kernel, the following vulnerability has been resolved: pstore: inode: Only d_invalidate() is needed Unloading a modular pstore backend with records in pstorefs would trigger the dput() double-drop warning: WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410 Using the combo of d_drop()/dput() (as mentioned in Documentation/filesystems/vfs.rst) isn't the right approach here, and leads to the reference counting problem seen above. Use d_invalidate() and update the code to not bother checking for error codes that can never happen. ---
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

18 Sep 2025, 16:14

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6 - () https://git.kernel.org/stable/c/340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6 - Patch
References () https://git.kernel.org/stable/c/4cdf9006fc095af71da80e9b5f48a32e991b9ed3 - () https://git.kernel.org/stable/c/4cdf9006fc095af71da80e9b5f48a32e991b9ed3 - Patch
References () https://git.kernel.org/stable/c/a43e0fc5e9134a46515de2f2f8d4100b74e50de3 - () https://git.kernel.org/stable/c/a43e0fc5e9134a46515de2f2f8d4100b74e50de3 - Patch
References () https://git.kernel.org/stable/c/cb9e802e49c24eeb3af35e9e8c04d526f35f112a - () https://git.kernel.org/stable/c/cb9e802e49c24eeb3af35e9e8c04d526f35f112a - Patch
References () https://git.kernel.org/stable/c/db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e - () https://git.kernel.org/stable/c/db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e - Patch
CWE CWE-415
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:04

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6 - () https://git.kernel.org/stable/c/340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6 -
References () https://git.kernel.org/stable/c/4cdf9006fc095af71da80e9b5f48a32e991b9ed3 - () https://git.kernel.org/stable/c/4cdf9006fc095af71da80e9b5f48a32e991b9ed3 -
References () https://git.kernel.org/stable/c/a43e0fc5e9134a46515de2f2f8d4100b74e50de3 - () https://git.kernel.org/stable/c/a43e0fc5e9134a46515de2f2f8d4100b74e50de3 -
References () https://git.kernel.org/stable/c/cb9e802e49c24eeb3af35e9e8c04d526f35f112a - () https://git.kernel.org/stable/c/cb9e802e49c24eeb3af35e9e8c04d526f35f112a -
References () https://git.kernel.org/stable/c/db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e - () https://git.kernel.org/stable/c/db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pstore: inode: solo se necesita d_invalidate(). La descarga de un backend modular de pstore con registros en pstorefs activaría la advertencia de doble caída de dput(): ADVERTENCIA: CPU: 0 PID: 2569 en fs/dcache.c:762 dput.part.0+0x3f3/0x410 Usar la combinación de d_drop()/dput() (como se menciona en Documentation/filesystems/vfs.rst) no es el enfoque correcto aquí, y conduce al problema de recuento de referencias visto anteriormente. Utilice d_invalidate() y actualice el código para no molestarse en buscar códigos de error que nunca sucederán. ---

01 May 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-01 13:15

Updated : 2025-09-18 16:14


NVD link : CVE-2024-27389

Mitre link : CVE-2024-27389

CVE.ORG link : CVE-2024-27389


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free