ima: Fix use-after-free on a dentry's dname.name
->d_name.name can change on rename and the earlier value can be freed;
there are conditions sufficient to stabilize it (->d_lock on dentry,
->d_lock on its parent, ->i_rwsem exclusive on the parent's inode,
rename_lock), but none of those are met at any of the sites. Take a stable
snapshot of the name instead.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4008-1 | linux-6.1 security update |
Debian DLA |
DLA-4178-1 | linux security update |
Debian DSA |
DSA-5731-1 | linux security update |
Ubuntu USN |
USN-6999-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6999-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7004-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7005-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7005-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7008-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-4 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7021-5 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7022-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7022-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7022-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7029-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7069-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7069-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7110-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7119-1 | Linux kernel (IoT) vulnerabilities |
Tue, 06 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| CPEs | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Debian
Debian debian Linux |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Mar 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 14 Dec 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-11T20:21:38.773Z
Reserved: 2024-06-25T14:23:23.748Z
Link: CVE-2024-39494
Updated: 2024-08-02T04:26:15.999Z
Status : Analyzed
Published: 2024-07-12T13:15:12.113
Modified: 2026-01-06T15:06:55.657
Link: CVE-2024-39494
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN