Fix AUX buffer serialization
CVE-2024-46713

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
13 September 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

In the Linux kernel, the following vulnerability has been resolved:

perf/aux: Fix AUX buffer serialization

Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it.

Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.

Affected Version(s)

Linux 45bfb2e50471abbbfd83d40d28c986078b0d24ff < 7882923f1cb88dc1a17f2bf0c81b1fc80d44db82

Linux 45bfb2e50471abbbfd83d40d28c986078b0d24ff < 52d13d224fdf1299c8b642807fa1ea14d693f5ff

Linux 45bfb2e50471abbbfd83d40d28c986078b0d24ff < 9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.