Show plain JSON{"dataType": "CVE_RECORD", "cveMetadata": {"cveId": "CVE-2024-35955", "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "state": "PUBLISHED", "assignerShortName": "Linux", "dateReserved": "2024-05-17T13:50:33.136Z", "datePublished": "2024-05-20T09:41:48.607Z", "dateUpdated": "2024-12-19T08:59:01.803Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux", "dateUpdated": "2024-12-19T08:59:01.803Z"}, "descriptions": [{"lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkprobes: Fix possible use-after-free issue on kprobe registration\n\nWhen unloading a module, its state is changing MODULE_STATE_LIVE ->\n MODULE_STATE_GOING -> MODULE_STATE_UNFORMED. Each change will take\na time. `is_module_text_address()` and `__module_text_address()`\nworks with MODULE_STATE_LIVE and MODULE_STATE_GOING.\nIf we use `is_module_text_address()` and `__module_text_address()`\nseparately, there is a chance that the first one is succeeded but the\nnext one is failed because module->state becomes MODULE_STATE_UNFORMED\nbetween those operations.\n\nIn `check_kprobe_address_safe()`, if the second `__module_text_address()`\nis failed, that is ignored because it expected a kernel_text address.\nBut it may have failed simply because module->state has been changed\nto MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify\nnon-exist module text address (use-after-free).\n\nTo fix this problem, we should not use separated `is_module_text_address()`\nand `__module_text_address()`, but use only `__module_text_address()`\nonce and do `try_module_get(module)` which is only available with\nMODULE_STATE_LIVE."}], "affected": [{"product": "Linux", "vendor": "Linux", "defaultStatus": "unaffected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["kernel/kprobes.c"], "versions": [{"version": "1c836bad43f3e2ff71cc397a6e6ccb4e7bd116f8", "lessThan": "b5808d40093403334d939e2c3c417144d12a6f33", "status": "affected", "versionType": "git"}, {"version": "6a119c1a584aa7a2c6216458f1f272bf1bc93a93", "lessThan": "93eb31e7c3399e326259f2caa17be1e821f5a412", "status": "affected", "versionType": "git"}, {"version": "2a49b025c36ae749cee7ccc4b7e456e02539cdc3", "lessThan": "5062d1f4f07facbdade0f402d9a04a788f52e26d", "status": "affected", "versionType": "git"}, {"version": "a1edb85e60fdab1e14db63ae8af8db3f0d798fb6", "lessThan": "2df2dd27066cdba8041e46a64362325626bdfb2e", "status": "affected", "versionType": "git"}, {"version": "28f6c37a2910f565b4f5960df52b2eccae28c891", "lessThan": "62029bc9ff2c17a4e3a2478d83418ec575413808", "status": "affected", "versionType": "git"}, {"version": "28f6c37a2910f565b4f5960df52b2eccae28c891", "lessThan": "d15023fb407337028a654237d8968fefdcf87c2f", "status": "affected", "versionType": "git"}, {"version": "28f6c37a2910f565b4f5960df52b2eccae28c891", "lessThan": "36b57c7d2f8b7de224980f1a284432846ad71ca0", "status": "affected", "versionType": "git"}, {"version": "28f6c37a2910f565b4f5960df52b2eccae28c891", "lessThan": "325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8", "status": "affected", "versionType": "git"}]}, {"product": "Linux", "vendor": "Linux", "defaultStatus": "affected", "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "programFiles": ["kernel/kprobes.c"], "versions": [{"version": "6.0", "status": "affected"}, {"version": "0", "lessThan": "6.0", "status": "unaffected", "versionType": "semver"}, {"version": "4.19.313", "lessThanOrEqual": "4.19.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.4.275", "lessThanOrEqual": "5.4.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.10.216", "lessThanOrEqual": "5.10.*", "status": "unaffected", "versionType": "semver"}, {"version": "5.15.157", "lessThanOrEqual": "5.15.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.1.87", "lessThanOrEqual": "6.1.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.6.28", "lessThanOrEqual": "6.6.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.8.7", "lessThanOrEqual": "6.8.*", "status": "unaffected", "versionType": "semver"}, {"version": "6.9", "lessThanOrEqual": "*", "status": "unaffected", "versionType": "original_commit_for_fix"}]}], "references": [{"url": "https://git.kernel.org/stable/c/b5808d40093403334d939e2c3c417144d12a6f33"}, {"url": "https://git.kernel.org/stable/c/93eb31e7c3399e326259f2caa17be1e821f5a412"}, {"url": "https://git.kernel.org/stable/c/5062d1f4f07facbdade0f402d9a04a788f52e26d"}, {"url": "https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e"}, {"url": "https://git.kernel.org/stable/c/62029bc9ff2c17a4e3a2478d83418ec575413808"}, {"url": "https://git.kernel.org/stable/c/d15023fb407337028a654237d8968fefdcf87c2f"}, {"url": "https://git.kernel.org/stable/c/36b57c7d2f8b7de224980f1a284432846ad71ca0"}, {"url": "https://git.kernel.org/stable/c/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8"}], "title": "kprobes: Fix possible use-after-free issue on kprobe registration", "x_generator": {"engine": "bippy-5f407fcff5a0"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-416", "lang": "en", "description": "CWE-416 Use After Free"}]}], "affected": [{"vendor": "linux", "product": "linux_kernel", "cpes": ["cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "1c836bad43f3", "status": "affected", "lessThan": "b5808d400934", "versionType": "git"}, {"version": "6a119c1a584a", "status": "affected", "lessThan": "93eb31e7c339", "versionType": "git"}, {"version": "2a49b025c36a", "status": "affected", "lessThan": "93eb31e7c339", "versionType": "git"}, {"version": "a1edb85e60fd", "status": "affected", "lessThan": "2df2dd27066c", "versionType": "git"}, {"version": "28f6c37a2910", "status": "affected", "lessThan": "62029bc9ff2c", "versionType": "git"}, {"version": "28f6c37a2910", "status": "affected", "lessThan": "d15023fb4073", "versionType": "git"}, {"version": "28f6c37a2910", "status": "affected", "lessThan": "36b57c7d2f8b", "versionType": "git"}, {"version": "28f6c37a2910", "status": "affected", "lessThan": "325f3fb551f8", "versionType": "git"}, {"version": "6.0", "status": "affected"}]}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}, {"other": {"type": "ssvc", "content": {"timestamp": "2024-05-20T17:42:32.103628Z", "id": "CVE-2024-35955", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-01T13:44:14.513Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T03:21:48.971Z"}, "title": "CVE Program Container", "references": [{"url": "https://git.kernel.org/stable/c/b5808d40093403334d939e2c3c417144d12a6f33", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/93eb31e7c3399e326259f2caa17be1e821f5a412", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/5062d1f4f07facbdade0f402d9a04a788f52e26d", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/62029bc9ff2c17a4e3a2478d83418ec575413808", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/d15023fb407337028a654237d8968fefdcf87c2f", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/36b57c7d2f8b7de224980f1a284432846ad71ca0", "tags": ["x_transferred"]}, {"url": "https://git.kernel.org/stable/c/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8", "tags": ["x_transferred"]}, {"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "tags": ["x_transferred"]}, {"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", "tags": ["x_transferred"]}]}]}, "dataVersion": "5.1"}