cve-2024-41030
Vulnerability from cvelistv5
Published
2024-07-29 14:31
Modified
2024-12-19 09:10
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: ksmbd: discard write access to the directory open may_open() does not allow a directory to be opened with the write access. However, some writing flags set by client result in adding write access on server, making ksmbd incompatible with FUSE file system. Simply, let's discard the write access when opening a directory. list_add corruption. next is NULL. ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:26! pc : __list_add_valid+0x88/0xbc lr : __list_add_valid+0x88/0xbc Call trace: __list_add_valid+0x88/0xbc fuse_finish_open+0x11c/0x170 fuse_open_common+0x284/0x5e8 fuse_dir_open+0x14/0x24 do_dentry_open+0x2a4/0x4e0 dentry_open+0x50/0x80 smb2_open+0xbe4/0x15a4 handle_ksmbd_work+0x478/0x5ec process_one_work+0x1b4/0x448 worker_thread+0x25c/0x430 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20
Impacted products
Vendor Product Version
Linux Linux Version: 0626e6641f6b467447c81dd7678a69c66f7746cf
Version: 0626e6641f6b467447c81dd7678a69c66f7746cf
Version: 0626e6641f6b467447c81dd7678a69c66f7746cf
Version: 0626e6641f6b467447c81dd7678a69c66f7746cf
Create a notification for this product.
   Linux Linux Version: 5.15
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T04:39:56.177Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-41030",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-10T16:23:55.968881Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-11T17:34:04.010Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "fs/smb/server/smb2pdu.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "66cf853e1c7a2407f15d9f7aaa3e47d61745e361",
                     status: "affected",
                     version: "0626e6641f6b467447c81dd7678a69c66f7746cf",
                     versionType: "git",
                  },
                  {
                     lessThan: "9e84b1ba5c98fb5c9f869c85db1d870354613baa",
                     status: "affected",
                     version: "0626e6641f6b467447c81dd7678a69c66f7746cf",
                     versionType: "git",
                  },
                  {
                     lessThan: "198498b2049c0f11f7670be6974570e02b0cc035",
                     status: "affected",
                     version: "0626e6641f6b467447c81dd7678a69c66f7746cf",
                     versionType: "git",
                  },
                  {
                     lessThan: "e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd",
                     status: "affected",
                     version: "0626e6641f6b467447c81dd7678a69c66f7746cf",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "fs/smb/server/smb2pdu.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "5.15",
                  },
                  {
                     lessThan: "5.15",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.100",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.41",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.9.*",
                     status: "unaffected",
                     version: "6.9.10",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.10",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: discard write access to the directory open\n\nmay_open() does not allow a directory to be opened with the write access.\nHowever, some writing flags set by client result in adding write access\non server, making ksmbd incompatible with FUSE file system. Simply, let's\ndiscard the write access when opening a directory.\n\nlist_add corruption. next is NULL.\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:26!\npc : __list_add_valid+0x88/0xbc\nlr : __list_add_valid+0x88/0xbc\nCall trace:\n__list_add_valid+0x88/0xbc\nfuse_finish_open+0x11c/0x170\nfuse_open_common+0x284/0x5e8\nfuse_dir_open+0x14/0x24\ndo_dentry_open+0x2a4/0x4e0\ndentry_open+0x50/0x80\nsmb2_open+0xbe4/0x15a4\nhandle_ksmbd_work+0x478/0x5ec\nprocess_one_work+0x1b4/0x448\nworker_thread+0x25c/0x430\nkthread+0x104/0x1d4\nret_from_fork+0x10/0x20",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:10:25.316Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361",
            },
            {
               url: "https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa",
            },
            {
               url: "https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035",
            },
            {
               url: "https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd",
            },
         ],
         title: "ksmbd: discard write access to the directory open",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-41030",
      datePublished: "2024-07-29T14:31:46.144Z",
      dateReserved: "2024-07-12T12:17:45.618Z",
      dateUpdated: "2024-12-19T09:10:25.316Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-41030\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-29T15:15:11.697\",\"lastModified\":\"2024-11-21T09:32:06.033\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nksmbd: discard write access to the directory open\\n\\nmay_open() does not allow a directory to be opened with the write access.\\nHowever, some writing flags set by client result in adding write access\\non server, making ksmbd incompatible with FUSE file system. Simply, let's\\ndiscard the write access when opening a directory.\\n\\nlist_add corruption. next is NULL.\\n------------[ cut here ]------------\\nkernel BUG at lib/list_debug.c:26!\\npc : __list_add_valid+0x88/0xbc\\nlr : __list_add_valid+0x88/0xbc\\nCall trace:\\n__list_add_valid+0x88/0xbc\\nfuse_finish_open+0x11c/0x170\\nfuse_open_common+0x284/0x5e8\\nfuse_dir_open+0x14/0x24\\ndo_dentry_open+0x2a4/0x4e0\\ndentry_open+0x50/0x80\\nsmb2_open+0xbe4/0x15a4\\nhandle_ksmbd_work+0x478/0x5ec\\nprocess_one_work+0x1b4/0x448\\nworker_thread+0x25c/0x430\\nkthread+0x104/0x1d4\\nret_from_fork+0x10/0x20\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ksmbd: descarta el acceso de escritura al directorio abierto may_open() no permite abrir un directorio con acceso de escritura. Sin embargo, algunos indicadores de escritura establecidos por el cliente dan como resultado la adición de acceso de escritura en el servidor, lo que hace que ksmbd sea incompatible con el sistema de archivos FUSE. Simplemente, descartemos el acceso de escritura al abrir un directorio. list_add corrupción. lo siguiente es NULO. ------------[ cortar aquí ]------------ ¡ERROR del kernel en lib/list_debug.c:26! pc: __list_add_valid+0x88/0xbc lr: __list_add_valid+0x88/0xbc Rastreo de llamadas: __list_add_valid+0x88/0xbc fuse_finish_open+0x11c/0x170 fuse_open_common+0x284/0x5e8 fuse_dir_open+0x14/0x24 a4/0x4e0 dentry_open+0x50/0x80 smb2_open+0xbe4 /0x15a4 handle_ksmbd_work+0x478/0x5ec process_one_work+0x1b4/0x448 worker_thread+0x25c/0x430 kthread+0x104/0x1d4 ret_from_fork+0x10/0x20\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:39:56.177Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41030\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:23:55.968881Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:20.453Z\"}}], \"cna\": {\"title\": \"ksmbd: discard write access to the directory open\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"0626e6641f6b467447c81dd7678a69c66f7746cf\", \"lessThan\": \"66cf853e1c7a2407f15d9f7aaa3e47d61745e361\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0626e6641f6b467447c81dd7678a69c66f7746cf\", \"lessThan\": \"9e84b1ba5c98fb5c9f869c85db1d870354613baa\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0626e6641f6b467447c81dd7678a69c66f7746cf\", \"lessThan\": \"198498b2049c0f11f7670be6974570e02b0cc035\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0626e6641f6b467447c81dd7678a69c66f7746cf\", \"lessThan\": \"e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd\", \"versionType\": \"git\"}], \"programFiles\": [\"fs/smb/server/smb2pdu.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.15\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.15\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.1.100\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.41\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"fs/smb/server/smb2pdu.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/66cf853e1c7a2407f15d9f7aaa3e47d61745e361\"}, {\"url\": \"https://git.kernel.org/stable/c/9e84b1ba5c98fb5c9f869c85db1d870354613baa\"}, {\"url\": \"https://git.kernel.org/stable/c/198498b2049c0f11f7670be6974570e02b0cc035\"}, {\"url\": \"https://git.kernel.org/stable/c/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nksmbd: discard write access to the directory open\\n\\nmay_open() does not allow a directory to be opened with the write access.\\nHowever, some writing flags set by client result in adding write access\\non server, making ksmbd incompatible with FUSE file system. Simply, let's\\ndiscard the write access when opening a directory.\\n\\nlist_add corruption. next is NULL.\\n------------[ cut here ]------------\\nkernel BUG at lib/list_debug.c:26!\\npc : __list_add_valid+0x88/0xbc\\nlr : __list_add_valid+0x88/0xbc\\nCall trace:\\n__list_add_valid+0x88/0xbc\\nfuse_finish_open+0x11c/0x170\\nfuse_open_common+0x284/0x5e8\\nfuse_dir_open+0x14/0x24\\ndo_dentry_open+0x2a4/0x4e0\\ndentry_open+0x50/0x80\\nsmb2_open+0xbe4/0x15a4\\nhandle_ksmbd_work+0x478/0x5ec\\nprocess_one_work+0x1b4/0x448\\nworker_thread+0x25c/0x430\\nkthread+0x104/0x1d4\\nret_from_fork+0x10/0x20\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:10:25.316Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-41030\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:10:25.316Z\", \"dateReserved\": \"2024-07-12T12:17:45.618Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-29T14:31:46.144Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.