In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on rename and the earlier value can be freed; there are conditions sufficient to stabilize it (->d_lock on dentry, ->d_lock on its parent, ->i_rwsem exclusive on the parent's inode, rename_lock), but none of those are met at any of the sites. Take a stable snapshot of the name instead.
History

Thu, 13 Mar 2025 12:30:00 +0000


Sat, 14 Dec 2024 21:00:00 +0000


Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-07-12T12:20:30.348Z

Updated: 2025-05-15T12:13:17.425Z

Reserved: 2024-06-25T14:23:23.748Z

Link: CVE-2024-39494

cve-icon Vulnrichment

Updated: 2024-08-02T04:26:15.999Z

cve-icon NVD

Status : Modified

Published: 2024-07-12T13:15:12.113

Modified: 2025-03-13T13:15:40.680

Link: CVE-2024-39494

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-07-12T00:00:00Z

Links: CVE-2024-39494 - Bugzilla