CVE-2024-50010

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50010
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50010.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50010
Downstream
Related
Published
2024-10-21T18:54:02.974Z
Modified
2025-11-28T02:35:38.672404Z
Summary
exec: don't WARN for racy path_noexec check
Details

In the Linux kernel, the following vulnerability has been resolved:

exec: don't WARN for racy path_noexec check

Both imode and noexec checks wrapped in WARNON stem from an artifact of the previous implementation. They used to legitimately check for the condition, but that got moved up in two commits: 633fb6ac3980 ("exec: move SISREG() check earlier") 0fd338b2d2cd ("exec: move pathnoexec() check earlier")

Instead of being removed said checks are WARN_ON'ed instead, which has some debug value.

However, the spurious path_noexec check is racy, resulting in unwarranted warnings should someone race with setting the noexec flag.

One can note there is more to perm-checking whether execve is allowed and none of the conditions are guaranteed to still hold after they were tested for.

Additionally this does not validate whether the code path did any perm checking to begin with -- it will pass if the inode happens to be regular.

Keep the redundant path_noexec() check even though it's mindless nonsense checking for guarantee that isn't given so drop the WARN.

Reword the commentary and do small tidy ups while here.

[brauner: keep redundant path_noexec() check]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/50xxx/CVE-2024-50010.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
c9b77438077d5a20c79ead95bcdaf9bd4797baaf
Fixed
b723f96407a0a078cf75970e4dbf16b46d286a61
Fixed
0bdf77be2330062b3a64f2bec39f62ab874a6796
Fixed
0d16f53c91111cec914f0811fcc526a2ba77b20d
Fixed
0d196e7589cefe207d5d41f37a0a28a1fdeeb7c6

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.229
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.170
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.115
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.59