First published: Mon Aug 26 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mm: list_lru: fix UAF for memory cgroup The mem_cgroup_from_slab_obj() is supposed to be called under rcu lock or cgroup_mutex or others which could prevent returned memcg from being freed. Fix it by adding missing rcu read lock. Found by code inspection. [songmuchun: only grab rcu lock when necessary, per Vlastimil] Link: <a href="https://lkml.kernel.org/r/20240801024603.1865-1-songmuchun@bytedance.com">https://lkml.kernel.org/r/20240801024603.1865-1-songmuchun@bytedance.com</a>
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=6.8<6.10.5 | |
Linux kernel | =6.11-rc1 | |
Linux kernel | =6.11-rc2 | |
Linux Kernel | >=6.8<6.10.5 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43888 has been classified as a medium severity vulnerability affecting the Linux kernel.
To fix CVE-2024-43888, update your Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, or 6.12.11-1.
CVE-2024-43888 affects Linux kernel versions from 6.8 up to 6.10.5 and specific release candidates 6.11-rc1 and 6.11-rc2.
CVE-2024-43888 is a use-after-free (UAF) vulnerability related to the memory control group management in the Linux kernel.
CVE-2024-43888 is not categorized as a remote code execution vulnerability, but it could potentially be exploited locally if conditions allow.