{"id":"CVE-2024-38588","summary":"ftrace: Fix possible use-after-free issue in ftrace_location()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix possible use-after-free issue in ftrace_location()\n\nKASAN reports a bug:\n\n  BUG: KASAN: use-after-free in ftrace_location+0x90/0x120\n  Read of size 8 at addr ffff888141d40010 by task insmod/424\n  CPU: 8 PID: 424 Comm: insmod Tainted: G        W          6.9.0-rc2+\n  [...]\n  Call Trace:\n   \u003cTASK\u003e\n   dump_stack_lvl+0x68/0xa0\n   print_report+0xcf/0x610\n   kasan_report+0xb5/0xe0\n   ftrace_location+0x90/0x120\n   register_kprobe+0x14b/0xa40\n   kprobe_init+0x2d/0xff0 [kprobe_example]\n   do_one_initcall+0x8f/0x2d0\n   do_init_module+0x13a/0x3c0\n   load_module+0x3082/0x33d0\n   init_module_from_file+0xd2/0x130\n   __x64_sys_finit_module+0x306/0x440\n   do_syscall_64+0x68/0x140\n   entry_SYSCALL_64_after_hwframe+0x71/0x79\n\nThe root cause is that, in lookup_rec(), ftrace record of some address\nis being searched in ftrace pages of some module, but those ftrace pages\nat the same time is being freed in ftrace_release_mod() as the\ncorresponding module is being deleted:\n\n           CPU1                       |      CPU2\n  register_kprobes() {                | delete_module() {\n    check_kprobe_address_safe() {     |\n      arch_check_ftrace_location() {  |\n        ftrace_location() {           |\n          lookup_rec() // USE!        |   ftrace_release_mod() // Free!\n\nTo fix this issue:\n  1. Hold rcu lock as accessing ftrace pages in ftrace_location_range();\n  2. Use ftrace_location_range() instead of lookup_rec() in\n     ftrace_location();\n  3. Call synchronize_rcu() before freeing any ftrace pages both in\n     ftrace_process_locs()/ftrace_release_mod()/ftrace_free_mem().","modified":"2026-04-16T04:39:35.617584369Z","published":"2024-06-19T13:37:43.262Z","related":["SUSE-SU-2024:2571-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:02334-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38588.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1880a324af1c95940a7c954b6b937e86844a33bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/31310e373f4c8c74e029d4326b283e757edabc0b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/66df065b3106964e667b37bf8f7e55ec69d0c1f6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7b4881da5b19f65709f5c18c1a4d8caa2e496461"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ea8ef5e42173560ac510e92a1cc797ffeea8831"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dbff5f0bfb2416b8b55c105ddbcd4f885e98fada"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e60b613df8b6253def41215402f72986fee3fc8d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eea46baf145150910ba134f75a67106ba2222c1b"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38588.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38588"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ae6aa16fdc163afe6b04b6c073ad4ddd4663c03b"},{"fixed":"eea46baf145150910ba134f75a67106ba2222c1b"},{"fixed":"1880a324af1c95940a7c954b6b937e86844a33bd"},{"fixed":"8ea8ef5e42173560ac510e92a1cc797ffeea8831"},{"fixed":"dbff5f0bfb2416b8b55c105ddbcd4f885e98fada"},{"fixed":"7b4881da5b19f65709f5c18c1a4d8caa2e496461"},{"fixed":"66df065b3106964e667b37bf8f7e55ec69d0c1f6"},{"fixed":"31310e373f4c8c74e029d4326b283e757edabc0b"},{"fixed":"e60b613df8b6253def41215402f72986fee3fc8d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38588.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}