
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-38580 is a vulnerability in the Linux kernel's epoll subsystem that was discovered and resolved in 2024. The issue involves a race condition in the epoll subsystem where it can call out to vfs_poll() with a file pointer that may race with the last 'fput()' operation (Kernel Git).
The vulnerability occurs when fcount goes down to zero while the ep->mtx locking blocks the file pointer tear-down until the poll returns. Although the locking prevents immediate tear-down, the fcount being dead means any subsequent use won't actually get a reference to the file. The fix involves ensuring a valid reference on the file pointer before calling down to vfspoll() from the epoll routines by implementing a new epifget() function that safely handles file pointer references (Kernel Git).
When exploited, this vulnerability could lead to use-after-free conditions in the kernel's file handling system, potentially affecting system stability and security. The issue specifically impacts the epoll subsystem's ability to properly handle file descriptor references during polling operations (RHSA-2024:4928).
The issue has been fixed in the Linux kernel through a patch that implements proper file reference handling. The fix has been backported to various stable kernel versions and is available through distribution updates. Users should update their systems to the patched versions available through their distribution's update channels (RHSA-2024:4928).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."