CVE-2024-36881
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/05/2024
Last modified:
01/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/userfaultfd: reset ptes when close() for wr-protected ones<br />
<br />
Userfaultfd unregister includes a step to remove wr-protect bits from all<br />
the relevant pgtable entries, but that only covered an explicit<br />
UFFDIO_UNREGISTER ioctl, not a close() on the userfaultfd itself. Cover<br />
that too. This fixes a WARN trace.<br />
<br />
The only user visible side effect is the user can observe leftover<br />
wr-protect bits even if the user close()ed on an userfaultfd when<br />
releasing the last reference of it. However hopefully that should be<br />
harmless, and nothing bad should happen even if so.<br />
<br />
This change is now more important after the recent page-table-check<br />
patch we merged in mm-unstable (446dd9ad37d0 ("mm/page_table_check:<br />
support userfault wr-protect entries")), as we&#39;ll do sanity check on<br />
uffd-wp bits without vma context. So it&#39;s better if we can 100%<br />
guarantee no uffd-wp bit leftovers, to make sure each report will be<br />
valid.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19.6 (including) | 6.6.31 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931
- https://git.kernel.org/stable/c/8d8b68a5b0c9fb23d37df06bb273ead38fd5a29d
- https://git.kernel.org/stable/c/c88033efe9a391e72ba6b5df4b01d6e628f4e734
- https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931
- https://git.kernel.org/stable/c/8d8b68a5b0c9fb23d37df06bb273ead38fd5a29d
- https://git.kernel.org/stable/c/c88033efe9a391e72ba6b5df4b01d6e628f4e734



