First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway Syzbot reports a UAF in hugetlb_fault(). This happens because vmf_anon_prepare() could drop the per-VMA lock and allow the current VMA to be freed before hugetlb_vma_unlock_read() is called. We can fix this by using a modified version of vmf_anon_prepare() that doesn't release the VMA lock on failure, and then release it ourselves after hugetlb_vma_unlock_read().
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.9<6.10.13 | |
Linux Kernel | >=6.11<6.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47676 is considered a high severity vulnerability due to its potential for user-after-free exploitation in the Linux kernel.
To fix CVE-2024-47676, update your Linux kernel to a version that is patched for this vulnerability, specifically any above 6.10.13 or 6.11.2.
CVE-2024-47676 affects Linux kernel versions between 6.9 and 6.10.13 and between 6.11 and 6.11.2.
CVE-2024-47676 is a user-after-free vulnerability that can occur due to improper handling of virtual memory areas in the hugetlb fault pathway.
CVE-2024-47676 was reported by Syzbot, which is a fuzzer for the Linux kernel.