CVE-2024-26622

high

Description

In the Linux kernel, the following vulnerability has been resolved: tomoyo: fix UAF write bug in tomoyo_write_control() Since tomoyo_write_control() updates head->write_buf when write() of long lines is requested, we need to fetch head->write_buf after head->io_sem is held. Otherwise, concurrent write() requests can cause use-after-free-write and double-free problems.

References

https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html

https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee

https://git.kernel.org/stable/c/7d930a4da17958f869ef679ee0e4a8729337affc

https://git.kernel.org/stable/c/6edefe1b6c29a9932f558a898968a9fcbeec5711

https://git.kernel.org/stable/c/3bfe04c1273d30b866f4c7c238331ed3b08e5824

https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815

https://git.kernel.org/stable/c/2caa605079488da9601099fbda460cfc1702839f

Details

Source: Mitre, NVD

Published: 2024-03-04

Updated: 2024-12-11

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High