CVE-2024-40938

In the Linux kernel, the following vulnerability has been resolved: landlock: Fix d_parent walk The WARN_ON_ONCE() in collect_domain_accesses() can be triggered when trying to link a root mount point. This cannot work in practice because this directory is mounted, but the VFS check is done after the call to security_path_link(). Do not use source directory's d_parent when the source directory is the mount point. [mic: Fix commit message]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*

History

03 Nov 2025, 22:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

06 Oct 2025, 20:51

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc - () https://git.kernel.org/stable/c/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc - Patch
References () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f - () https://git.kernel.org/stable/c/b6e5e696435832b33e40775f060ef5c95f4fda1f - Patch
References () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 - () https://git.kernel.org/stable/c/c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6 - Patch
References () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 - () https://git.kernel.org/stable/c/cc30d05b34f9a087a6928d09b131f7b491e9ab11 - Patch

Information

Published : 2024-07-12 13:15

Updated : 2025-11-03 22:17


NVD link : CVE-2024-40938

Mitre link : CVE-2024-40938

CVE.ORG link : CVE-2024-40938


JSON object : View

Products Affected

linux

  • linux_kernel