CVE-2024-36000
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/05/2024
Last modified:
23/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/hugetlb: fix missing hugetlb_lock for resv uncharge<br />
<br />
There is a recent report on UFFDIO_COPY over hugetlb:<br />
<br />
https://lore.kernel.org/all/000000000000ee06de0616177560@google.com/<br />
<br />
350: lockdep_assert_held(&hugetlb_lock);<br />
<br />
Should be an issue in hugetlb but triggered in an userfault context, where<br />
it goes into the unlikely path where two threads modifying the resv map<br />
together. Mike has a fix in that path for resv uncharge but it looks like<br />
the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd()<br />
will update the cgroup pointer, so it requires to be called with the lock<br />
held.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9.7 (including) | 5.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.1 (including) | 6.1.91 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.30 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.10:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.10:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.10:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc
- https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10
- https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2
- https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505
- https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc
- https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10
- https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2
- https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505



