CVE-2024-36000

MEDIUM

Linux Kernel - Memory Corruption

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix missing hugetlb_lock for resv uncharge There is a recent report on UFFDIO_COPY over hugetlb: https://lore.kernel.org/all/[email protected]/ 350: lockdep_assert_held(&hugetlb_lock); Should be an issue in hugetlb but triggered in an userfault context, where it goes into the unlikely path where two threads modifying the resv map together. Mike has a fix in that path for resv uncharge but it looks like the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd() will update the cgroup pointer, so it requires to be called with the lock held.

Scores

CVSS v3 5.5
EPSS 0.0001
EPSS Percentile 0.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-617
Status published
Products (3)
linux/linux_kernel 5.10 (6 CPE variants)
linux/linux_kernel 6.9 rc1 (5 CPE variants)
linux/linux_kernel 5.9.7 - 5.10
Published May 20, 2024
Tracked Since Feb 18, 2026