First published: Mon Mar 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mm/damon/dbgfs: protect targets destructions with kdamond_lock DAMON debugfs interface iterates current monitoring targets in 'dbgfs_target_ids_read()' while holding the corresponding 'kdamond_lock'. However, it also destructs the monitoring targets in 'dbgfs_before_terminate()' without holding the lock. This can result in a use_after_free bug. This commit avoids the race by protecting the destruction with the corresponding 'kdamond_lock'.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=5.15<5.15.12 | |
Linux kernel | =5.16-rc1 | |
Linux kernel | =5.16-rc2 | |
Linux kernel | =5.16-rc3 | |
Linux kernel | =5.16-rc4 | |
Linux kernel | =5.16-rc5 | |
Linux kernel | =5.16-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47088 is classified as a medium-severity vulnerability affecting the Linux kernel.
To resolve CVE-2021-47088, update your Linux kernel to a version later than 5.15.12.
CVE-2021-47088 affects Linux kernel versions from 5.15 to 5.16-rc6.
CVE-2021-47088 involves a vulnerability in the DAMON debugfs interface in the Linux kernel.
CVE-2021-47088 may lead to improper handling of monitoring targets in the Linux kernel, potentially affecting system stability.