CVE-2024-47733

In the Linux kernel, the following vulnerability has been resolved: netfs: Delete subtree of 'fs/netfs' when netfs module exits In netfs_init() or fscache_proc_init(), we create dentry under 'fs/netfs', but in netfs_exit(), we only delete the proc entry of 'fs/netfs' without deleting its subtree. This triggers the following WARNING: ================================================================== remove_proc_entry: removing non-empty directory 'fs/netfs', leaking at least 'requests' WARNING: CPU: 4 PID: 566 at fs/proc/generic.c:717 remove_proc_entry+0x160/0x1c0 Modules linked in: netfs(-) CPU: 4 UID: 0 PID: 566 Comm: rmmod Not tainted 6.11.0-rc3 #860 RIP: 0010:remove_proc_entry+0x160/0x1c0 Call Trace: <TASK> netfs_exit+0x12/0x620 [netfs] __do_sys_delete_module.isra.0+0x14c/0x2e0 do_syscall_64+0x4b/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e ================================================================== Therefore use remove_proc_subtree() instead of remove_proc_entry() to fix the above problem.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Oct 2024, 17:11

Type Values Removed Values Added
CWE CWE-772
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfs: Eliminar subárbol de 'fs/netfs' cuando el módulo netfs sale En netfs_init() o fscache_proc_init(), creamos una dentry bajo 'fs/netfs', pero en netfs_exit(), solo eliminamos la entrada de procedimiento de 'fs/netfs' sin eliminar su subárbol. Esto activa la siguiente ADVERTENCIA: == ... netfs_exit+0x12/0x620 [netfs] __do_sys_delete_module.isra.0+0x14c/0x2e0 do_syscall_64+0x4b/0x110 entry_SYSCALL_64_after_hwframe+0x76/0x7e ======================================================================= Por lo tanto, utilice remove_proc_subtree() en lugar de remove_proc_entry() para solucionar el problema anterior.
References () https://git.kernel.org/stable/c/3c58a9575e02c2b90a3180007d57105ceaa7c246 - () https://git.kernel.org/stable/c/3c58a9575e02c2b90a3180007d57105ceaa7c246 - Patch
References () https://git.kernel.org/stable/c/603f95cefbee06a31b03137b777f03e3c2163d72 - () https://git.kernel.org/stable/c/603f95cefbee06a31b03137b777f03e3c2163d72 - Patch
References () https://git.kernel.org/stable/c/7a9eaf97d56625e55b31a7beb558e1ee185ca461 - () https://git.kernel.org/stable/c/7a9eaf97d56625e55b31a7beb558e1ee185ca461 - Patch

21 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 13:15

Updated : 2024-10-23 17:11


NVD link : CVE-2024-47733

Mitre link : CVE-2024-47733

CVE.ORG link : CVE-2024-47733


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-772

Missing Release of Resource after Effective Lifetime