CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
fork: defer linking file vma until vma is fully initialized
Thorvald reported a WARNING [1]. And the root cause is below race:
CPU 1 CPU 2
fork hugetlbfs_fallocate
dup_mmap hugetlbfs_punch_hole
i_mmap_lock_write(mapping);
vma_interval_tree_insert_after – Child vma is visible through i_mmap tree.
i_mmap_unlock_write(mapping);
hugetlb_dup_vma_private – Clear vma_lock outside i_mmap_rwsem!
i_mmap_lock_write(mapping);
hugetlb_vmdelete_list
vma_interval_tree_foreach
hugetlb_vma_trylock_write – Vma_lock is cleared.
tmp->vm_ops->open – Alloc new vma_lock outside i_mmap_rwsem!
hugetlb_vma_unlock_write – Vma_lock is assigned!!!
i_mmap_unlock_write(mapping);
hugetlb_dup_vma_private() and hugetlb_vm_op_open() are called outside
i_mmap_rwsem lock while vma lock can be used in the same time. Fix this
by deferring linking file vma until vma is fully initialized. Those vmas
should be initialized first before they can be used.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
linux | linux_kernel | 6.9 | cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* |
linux | linux_kernel | 6.9 | cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
linux | linux_kernel | 6.9 | cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* |
linux | linux_kernel | 6.9 | cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* |
[
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"kernel/fork.c"
],
"versions": [
{
"version": "8d9bfb260814",
"lessThan": "0c42f7e039ab",
"status": "affected",
"versionType": "git"
},
{
"version": "8d9bfb260814",
"lessThan": "04b0c4191234",
"status": "affected",
"versionType": "git"
},
{
"version": "8d9bfb260814",
"lessThan": "cec11fa2eb51",
"status": "affected",
"versionType": "git"
},
{
"version": "8d9bfb260814",
"lessThan": "dd782da47076",
"status": "affected",
"versionType": "git"
},
{
"version": "8d9bfb260814",
"lessThan": "abdb88dd272b",
"status": "affected",
"versionType": "git"
},
{
"version": "8d9bfb260814",
"lessThan": "35e351780fa9",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"kernel/fork.c"
],
"versions": [
{
"version": "6.1",
"status": "affected"
},
{
"version": "0",
"lessThan": "6.1",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.90",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.95",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.30",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.35",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.8.8",
"lessThanOrEqual": "6.8.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.9",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
]
git.kernel.org/stable/c/04b0c41912349aff11a1bbaef6a722bd7fbb90ac
git.kernel.org/stable/c/0c42f7e039aba3de6d7dbf92da708e2b2ecba557
git.kernel.org/stable/c/35e351780fa9d8240dd6f7e4f245f9ea37e96c19
git.kernel.org/stable/c/abdb88dd272bbeb93efe01d8e0b7b17e24af3a34
git.kernel.org/stable/c/cec11fa2eb512ebe3a459c185f4aca1d44059bbf
git.kernel.org/stable/c/dd782da470761077f4d1120e191f1a35787cda6e