112 Star 72 Fork 314

src-openEuler/kernel

CVE-2024-47809

已完成
CVE和安全问题 拥有者
创建于  
2025-01-22 16:50

一、漏洞信息
漏洞编号:CVE-2024-47809
漏洞归属组件:kernel
漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.19,6.1.8,6.4.0,6.6.0
CVSS V3.0分值:
BaseScore:5.5 Medium
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
漏洞简述:
In the Linux kernel, the following vulnerability has been resolved:dlm: fix possible lkb_resource null dereferenceThis patch fixes a possible null pointer dereference when this function iscalled from request_lock() as lkb->lkb_resource is not assigned yet,only after validate_lock_args() by calling attach_lkb(). Another issueis that a resource name could be a non printable bytearray and we cannotassume to be ASCII coded.The log functionality is probably never being hit when DLM is used innormal way and no debug logging is enabled. The null pointer dereferencecan only occur on a new created lkb that does not have the resourceassigned yet, it probably never hits the null pointer dereference but weshould be sure that other changes might not change this behaviour and weactually can hit the mentioned null pointer dereference.In this patch we just drop the printout of the resource name, the lkb idis enough to make a possible connection to a resource name if thisexists.
漏洞公开时间:2025-01-11 21:15:22
漏洞创建时间:2025-01-22 16:50:03
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2024-47809

更多参考(点击展开)
参考来源 参考链接 来源链接
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/2db11504ef82a60c1a2063ba7431a5cd013ecfcb
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/6fbdc3980b70e9c1c86eccea7d5ee68108008fa7
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/b98333c67daf887c724cd692e88e2db9418c0861
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-47809 https://bugzilla.suse.com/show_bug.cgi?id=1235714
suse_bugzilla https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-47809.mbox https://bugzilla.suse.com/show_bug.cgi?id=1235714
suse_bugzilla https://git.kernel.org/stable/c/6fbdc3980b70e9c1c86eccea7d5ee68108008fa7 https://bugzilla.suse.com/show_bug.cgi?id=1235714
suse_bugzilla https://git.kernel.org/stable/c/2db11504ef82a60c1a2063ba7431a5cd013ecfcb https://bugzilla.suse.com/show_bug.cgi?id=1235714
suse_bugzilla https://git.kernel.org/stable/c/b98333c67daf887c724cd692e88e2db9418c0861 https://bugzilla.suse.com/show_bug.cgi?id=1235714
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2024-47809 https://bugzilla.suse.com/show_bug.cgi?id=1235714
redhat_bugzilla https://lore.kernel.org/linux-cve-announce/2025011120-CVE-2024-47809-7b40@gregkh/T https://bugzilla.redhat.com/show_bug.cgi?id=2337342
debian https://security-tracker.debian.org/tracker/CVE-2024-47809
mageia http://advisories.mageia.org/MGASA-2025-0030.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://git.kernel.org/stable/c/2db11504ef82a60c1a2063ba7431a5cd013ecfcb nvd
https://git.kernel.org/stable/c/6fbdc3980b70e9c1c86eccea7d5ee68108008fa7 nvd
https://git.kernel.org/stable/c/b98333c67daf887c724cd692e88e2db9418c0861 nvd
linux_kernel 6.6.66 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=6fbdc3980b70e9c1c86eccea7d5ee68108008fa7Fixed linuxkernelcves
linux_kernel 6.12.5 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2db11504ef82a60c1a2063ba7431a5cd013ecfcbFixed linuxkernelcves
linux_kernel 6.13-rc1 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b98333c67daf887c724cd692e88e2db9418c0861Please linuxkernelcves

二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:dlm: fix possible lkb_resource null dereferenceThis patch fixes a possible null pointer dereference when this function iscalled from request_lock() as lkb->lkb_resource is not assigned yet,only after validate_lock_args() by calling attach_lkb(). Another issueis that a resource name could be a non printable bytearray and we cannotassume to be ASCII coded.The log functionality is probably never being hit when DLM is used innormal way and no debug logging is enabled. The null pointer dereferencecan only occur on a new created lkb that does not have the resourceassigned yet, it probably never hits the null pointer dereference but weshould be sure that other changes might not change this behaviour and weactually can hit the mentioned null pointer dereference.In this patch we just drop the printout of the resource name, the lkb idis enough to make a possible connection to a resource name if thisexists.
openEuler评分:
5.5
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(4.19.90):受影响
2.openEuler-22.03-LTS-SP3:受影响
3.openEuler-22.03-LTS-SP4:受影响
4.openEuler-24.03-LTS:受影响
5.openEuler-24.03-LTS-SP1:受影响
6.master:不受影响
7.openEuler-24.03-LTS-Next:不受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4(4.19.90):否
2.openEuler-22.03-LTS-SP3:否
3.master:否
4.openEuler-24.03-LTS:否
5.openEuler-24.03-LTS-Next:否
6.openEuler-22.03-LTS-SP4:否
7.openEuler-24.03-LTS-SP1:否

原因说明:
1.openEuler-24.03-LTS:正常修复
2.openEuler-24.03-LTS-SP1:正常修复
3.openEuler-20.03-LTS-SP4(4.19.90):不修复-超出修复范围
4.openEuler-22.03-LTS-SP3:不修复-超出修复范围
5.openEuler-22.03-LTS-SP4:不修复-超出修复范围
6.master:不受影响-漏洞代码不能被攻击者触发
7.openEuler-24.03-LTS-Next:不受影响-漏洞代码不能被攻击者触发

评论 (21)

登录 后才可以发表评论

状态
负责人
项目
里程碑
Pull Requests
关联的 Pull Requests 被合并后可能会关闭此 issue
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(1)
5329419 openeuler ci bot 1632792936
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel

搜索帮助