VYPR
Medium severity5.5NVD Advisory· Published May 17, 2024· Updated May 12, 2026

CVE-2024-35815

CVE-2024-35815

Description

In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion

The first kiocb_set_cancel_fn() argument may point at a struct kiocb that is not embedded inside struct aio_kiocb. With the current code, depending on the compiler, the req->ki_ctx read happens either before the IOCB_AIO_RW test or after that test. Move the req->ki_ctx read such that it is guaranteed that the IOCB_AIO_RW test happens first.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A race condition in the Linux kernel's fs/aio subsystem can lead to use of an invalid struct kiocb, potentially causing memory corruption or system crash.

Vulnerability

Description

CVE-2024-35815 is a race condition in the Linux kernel's asynchronous I/O (aio) subsystem. The bug occurs in the kiocb_set_cancel_fn() function, where the read of req->ki_ctx may happen before the check for the IOCB_AIO_RW flag, depending on compiler optimizations. This can cause the function to operate on a struct kiocb that is not embedded inside a struct aio_kiocb, leading to undefined behavior.

Exploitation

An attacker would need the ability to submit AIO requests and trigger the race condition. The vulnerability is local, requiring access to the system's AIO interface. No special privileges beyond being able to use AIO are necessary, but the race window is narrow and may be difficult to exploit reliably.

Impact

Successful exploitation could result in memory corruption or a system crash (denial of service). The CVSS v3 score of 5.5 (Medium) reflects the potential for local denial of service. The Siemens advisory [1] lists this CVE as affecting the SIMATIC S7-1500 TM MFP - GNU/Linux subsystem, indicating that industrial control systems may be impacted.

Mitigation

The fix has been applied in the Linux kernel stable tree. Users should update to a kernel version containing the commit that ensures the IOCB_AIO_RW check occurs before the req->ki_ctx read. Siemens recommends updating the affected product as per their advisory [1].

References
  1. SSA-265688

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

151

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.