CVE-2024-36000

Updated: 2024-08-13 02:00:07.11801

Description:

In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix missing hugetlb_lock for resv uncharge There is a recent report on UFFDIO_COPY over hugetlb: https://lore.kernel.org/all/000000000000ee06de0616177560@google.com/ 350:lockdep_assert_held(&hugetlb_lock); Should be an issue in hugetlb but triggered in an userfault context, where it goes into the unlikely path where two threads modifying the resv map together. Mike has a fix in that path for resv uncharge but it looks like the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd() will update the cgroup pointer, so it requires to be called with the lock held.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Needs Triage 2024-08-26 14:27:08
AlmaLinux 9.2 FIPS kernel 5.14.0 5.5 MEDIUM Ignored 2024-08-13 14:25:13
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-08-13 14:25:13
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-08-13 14:25:12
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-08-20 05:26:08
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-08-20 05:26:09
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-08-20 05:26:08
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-08-13 14:25:13
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-08-13 14:25:12
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-08-13 14:25:12