In the Linux kernel, the following vulnerability has been resolved:
landlock: Fix d_parent walk
The WARNONONCE() in collectdomainaccesses() can be triggered when trying to link a root mount point. This cannot work in practice because this directory is mounted, but the VFS check is done after the call to securitypathlink().
Do not use source directory's d_parent when the source directory is the mount point.
[mic: Fix commit message]
[ { "signature_type": "Line", "id": "CVE-2024-40938-02cbdfb6", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cc30d05b34f9a087a6928d09b131f7b491e9ab11", "signature_version": "v1", "target": { "file": "security/landlock/fs.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "213827556281678524905645535329192725830", "149690407061382769565452297628354641480", "154889461164160323304844178487350530255", "28784921119830855025601502702054131666", "171421861288920669046874264677195302232", "192426790225887767712289357592980806160", "131398699147959969849309332397366272505", "64027217528811153222041929079343977127", "305786860738208807675356862573592925233" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2024-40938-6ff329f7", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c7618c7b0b8c45bcef34410cc1d1e953eb17f8f6", "signature_version": "v1", "target": { "file": "security/landlock/fs.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "309792219104108564098316389873584763238", "149690407061382769565452297628354641480", "154889461164160323304844178487350530255", "28784921119830855025601502702054131666", "171421861288920669046874264677195302232", "192426790225887767712289357592980806160", "131398699147959969849309332397366272505", "64027217528811153222041929079343977127", "305786860738208807675356862573592925233" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2024-40938-7719ffc0", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b6e5e696435832b33e40775f060ef5c95f4fda1f", "signature_version": "v1", "target": { "file": "security/landlock/fs.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "213827556281678524905645535329192725830", "149690407061382769565452297628354641480", "154889461164160323304844178487350530255", "28784921119830855025601502702054131666", "171421861288920669046874264677195302232", "192426790225887767712289357592980806160", "131398699147959969849309332397366272505", "64027217528811153222041929079343977127", "305786860738208807675356862573592925233" ] }, "deprecated": false }, { "signature_type": "Line", "id": "CVE-2024-40938-a7b6d871", "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@88da52ccd66e65f2e63a6c35c9dff55d448ef4dc", "signature_version": "v1", "target": { "file": "security/landlock/fs.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "309792219104108564098316389873584763238", "149690407061382769565452297628354641480", "154889461164160323304844178487350530255", "28784921119830855025601502702054131666", "171421861288920669046874264677195302232", "192426790225887767712289357592980806160", "131398699147959969849309332397366272505", "64027217528811153222041929079343977127", "305786860738208807675356862573592925233" ] }, "deprecated": false } ]