CVE-2024-47746

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47746
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47746.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47746
Downstream
Related
Published
2024-10-21T12:14:13Z
Modified
2025-10-17T13:19:51.758478Z
Summary
fuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set
Details

In the Linux kernel, the following vulnerability has been resolved:

fuse: use exclusive lock when FUSEICACHEIOMODE is set

This may be a typo. The comment has said shared locks are not allowed when this bit is set. If using shared lock, the wait in fuse_file_cached_io_open may be forever.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
205c1d8026835746d8597e1aa70c370e014e83fa
Fixed
fa4890bd8237e5a1e7428acd7328729db2703b23
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
205c1d8026835746d8597e1aa70c370e014e83fa
Fixed
4e181761ffec67307157a7e8a78d58ee4130cf00
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
205c1d8026835746d8597e1aa70c370e014e83fa
Fixed
2f3d8ff457982f4055fe8f7bf19d3821ba22c376

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.10.1
v6.10.10
v6.10.11
v6.10.12
v6.10.2
v6.10.3
v6.10.4
v6.10.5
v6.10.6
v6.10.7
v6.10.8
v6.10.9
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.8
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "id": "CVE-2024-47746-043322ee",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "29835054483928294285851229249849088759",
                "278794539631409551009906832028644857921",
                "25909176793881195002859352759046150584",
                "135709596592141879259623069236409672637"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "fs/fuse/file.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e181761ffec67307157a7e8a78d58ee4130cf00",
        "signature_type": "Line",
        "deprecated": false
    },
    {
        "id": "CVE-2024-47746-6072a662",
        "signature_version": "v1",
        "digest": {
            "length": 472.0,
            "function_hash": "276866396469210177474140079062268332724"
        },
        "target": {
            "file": "fs/fuse/file.c",
            "function": "fuse_dio_wr_exclusive_lock"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4e181761ffec67307157a7e8a78d58ee4130cf00",
        "signature_type": "Function",
        "deprecated": false
    },
    {
        "id": "CVE-2024-47746-a69e43c5",
        "signature_version": "v1",
        "digest": {
            "length": 472.0,
            "function_hash": "276866396469210177474140079062268332724"
        },
        "target": {
            "file": "fs/fuse/file.c",
            "function": "fuse_dio_wr_exclusive_lock"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f3d8ff457982f4055fe8f7bf19d3821ba22c376",
        "signature_type": "Function",
        "deprecated": false
    },
    {
        "id": "CVE-2024-47746-d2e9cab8",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "29835054483928294285851229249849088759",
                "278794539631409551009906832028644857921",
                "25909176793881195002859352759046150584",
                "135709596592141879259623069236409672637"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "fs/fuse/file.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2f3d8ff457982f4055fe8f7bf19d3821ba22c376",
        "signature_type": "Line",
        "deprecated": false
    },
    {
        "id": "CVE-2024-47746-ea0a6cad",
        "signature_version": "v1",
        "digest": {
            "length": 472.0,
            "function_hash": "276866396469210177474140079062268332724"
        },
        "target": {
            "file": "fs/fuse/file.c",
            "function": "fuse_dio_wr_exclusive_lock"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa4890bd8237e5a1e7428acd7328729db2703b23",
        "signature_type": "Function",
        "deprecated": false
    },
    {
        "id": "CVE-2024-47746-ef24e686",
        "signature_version": "v1",
        "digest": {
            "line_hashes": [
                "29835054483928294285851229249849088759",
                "278794539631409551009906832028644857921",
                "25909176793881195002859352759046150584",
                "135709596592141879259623069236409672637"
            ],
            "threshold": 0.9
        },
        "target": {
            "file": "fs/fuse/file.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fa4890bd8237e5a1e7428acd7328729db2703b23",
        "signature_type": "Line",
        "deprecated": false
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.10.13
Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.11.2