Fix AUX buffer serialization
CVE-2024-46713
Key Information:
Badges
Summary
In the Linux kernel, the following vulnerability has been resolved:
perf/aux: Fix AUX buffer serialization
Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it.
Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.
Affected Version(s)
Linux 45bfb2e50471abbbfd83d40d28c986078b0d24ff < 7882923f1cb88dc1a17f2bf0c81b1fc80d44db82
Linux 45bfb2e50471abbbfd83d40d28c986078b0d24ff < 52d13d224fdf1299c8b642807fa1ea14d693f5ff
Linux 45bfb2e50471abbbfd83d40d28c986078b0d24ff < 9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved