In the Linux kernel, the following vulnerability has been resolved:
nbd: fix race between timeout and normal completion
If request timetout is handled by nbdrequeuecmd(), normal completion has to be stopped for avoiding to complete this requeued request, other use-after-free can be triggered.
Fix the race by clearing NBDCMDINFLIGHT in nbdrequeuecmd(), meantime make sure that cmd->lock is grabbed for clearing the flag and the requeue.
{ "vanir_signatures": [ { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/block/nbd.c", "function": "nbd_xmit_timeout" }, "id": "CVE-2024-49855-6610460e", "digest": { "length": 2025.0, "function_hash": "139391628315583585142970733870966937899" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e73b946a379a1dfbb62626af93843bdfb53753d" }, { "signature_version": "v1", "signature_type": "Function", "target": { "file": "drivers/block/nbd.c", "function": "nbd_requeue_cmd" }, "id": "CVE-2024-49855-88209412", "digest": { "length": 162.0, "function_hash": "326837376759182567742194232604094022936" }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e73b946a379a1dfbb62626af93843bdfb53753d" }, { "signature_version": "v1", "signature_type": "Line", "target": { "file": "drivers/block/nbd.c" }, "id": "CVE-2024-49855-b36b546c", "digest": { "line_hashes": [ "125654232293413073766435356104885139527", "119234602599385306559932509257191917854", "303692813771750753955214278373923074356", "37082458648883362371736793410764741556", "280537385661854359001488812618103992755", "156984792725686989975411358537870026100", "328424810361088377414338401222603677472", "144409930361049672049848577515781510765" ], "threshold": 0.9 }, "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e73b946a379a1dfbb62626af93843bdfb53753d" } ] }