We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-27022

fork: defer linking file vma until vma is fully initialized



Description

In the Linux kernel, the following vulnerability has been resolved: fork: defer linking file vma until vma is fully initialized Thorvald reported a WARNING [1]. And the root cause is below race: CPU 1 CPU 2 fork hugetlbfs_fallocate dup_mmap hugetlbfs_punch_hole i_mmap_lock_write(mapping); vma_interval_tree_insert_after -- Child vma is visible through i_mmap tree. i_mmap_unlock_write(mapping); hugetlb_dup_vma_private -- Clear vma_lock outside i_mmap_rwsem! i_mmap_lock_write(mapping); hugetlb_vmdelete_list vma_interval_tree_foreach hugetlb_vma_trylock_write -- Vma_lock is cleared. tmp->vm_ops->open -- Alloc new vma_lock outside i_mmap_rwsem! hugetlb_vma_unlock_write -- Vma_lock is assigned!!! i_mmap_unlock_write(mapping); hugetlb_dup_vma_private() and hugetlb_vm_op_open() are called outside i_mmap_rwsem lock while vma lock can be used in the same time. Fix this by deferring linking file vma until vma is fully initialized. Those vmas should be initialized first before they can be used.

Reserved 2024-02-19 | Published 2024-05-01 | Updated 2025-01-24 | Assigner Linux

Product status

Default status
unaffected

8d9bfb2608145cf3e408428c224099e1585471af before abdb88dd272bbeb93efe01d8e0b7b17e24af3a34
affected

8d9bfb2608145cf3e408428c224099e1585471af before 35e351780fa9d8240dd6f7e4f245f9ea37e96c19
affected

Default status
affected

6.1
affected

Any version before 6.1
unaffected

6.8.8
unaffected

6.9
unaffected

References

git.kernel.org/...c/abdb88dd272bbeb93efe01d8e0b7b17e24af3a34

git.kernel.org/...c/35e351780fa9d8240dd6f7e4f245f9ea37e96c19

cve.org (CVE-2024-27022)

nvd.nist.gov (CVE-2024-27022)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-27022

Support options

Helpdesk Chat, Email, Knowledgebase