We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50207

ring-buffer: Fix reader locking when changing the sub buffer order



Description

In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Fix reader locking when changing the sub buffer order The function ring_buffer_subbuf_order_set() updates each ring_buffer_per_cpu and installs new sub buffers that match the requested page order. This operation may be invoked concurrently with readers that rely on some of the modified data, such as the head bit (RB_PAGE_HEAD), or the ring_buffer_per_cpu.pages and reader_page pointers. However, no exclusive access is acquired by ring_buffer_subbuf_order_set(). Modifying the mentioned data while a reader also operates on them can then result in incorrect memory access and various crashes. Fix the problem by taking the reader_lock when updating a specific ring_buffer_per_cpu in ring_buffer_subbuf_order_set().

Reserved 2024-10-21 | Published 2024-11-08 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

8e7b58c27b3c before a569290525a0
affected

8e7b58c27b3c before 09661f75e75c
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.11.6
unaffected

6.12
unaffected

References

git.kernel.org/...c/a569290525a05162d5dd26d9845591eaf46e5802

git.kernel.org/...c/09661f75e75cb6c1d2d8326a70c311d46729235f

cve.org (CVE-2024-50207)

nvd.nist.gov (CVE-2024-50207)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50207

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.