We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-27389

pstore: inode: Only d_invalidate() is needed



Description

In the Linux kernel, the following vulnerability has been resolved: pstore: inode: Only d_invalidate() is needed Unloading a modular pstore backend with records in pstorefs would trigger the dput() double-drop warning: WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410 Using the combo of d_drop()/dput() (as mentioned in Documentation/filesystems/vfs.rst) isn't the right approach here, and leads to the reference counting problem seen above. Use d_invalidate() and update the code to not bother checking for error codes that can never happen. ---

Reserved 2024-02-25 | Published 2024-05-01 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

609e28bb139e53621521130f0d4aea27a725d465 before db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e
affected

609e28bb139e53621521130f0d4aea27a725d465 before 4cdf9006fc095af71da80e9b5f48a32e991b9ed3
affected

609e28bb139e53621521130f0d4aea27a725d465 before cb9e802e49c24eeb3af35e9e8c04d526f35f112a
affected

609e28bb139e53621521130f0d4aea27a725d465 before 340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6
affected

609e28bb139e53621521130f0d4aea27a725d465 before a43e0fc5e9134a46515de2f2f8d4100b74e50de3
affected

Default status
affected

5.8
affected

Any version before 5.8
unaffected

6.1.83
unaffected

6.6.23
unaffected

6.7.11
unaffected

6.8.2
unaffected

6.9
unaffected

References

git.kernel.org/...c/db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e

git.kernel.org/...c/4cdf9006fc095af71da80e9b5f48a32e991b9ed3

git.kernel.org/...c/cb9e802e49c24eeb3af35e9e8c04d526f35f112a

git.kernel.org/...c/340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6

git.kernel.org/...c/a43e0fc5e9134a46515de2f2f8d4100b74e50de3

cve.org (CVE-2024-27389)

nvd.nist.gov (CVE-2024-27389)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27389

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.