First published: Fri Jun 03 2011(Updated: )
Andrea Righi reported a case where an exiting task can race against ksmd. ksm_scan.mm_slot == the only registered mm CPU 1 (bug program) CPU 2 (ksmd) list_empty() is false lock ksm_scan.mm_slot list_del unlock slot == &ksm_mm_head (but list is now empty_) Close this race by revalidating that the new slot is not simply the list head again. Reproducer: <a href="http://www.spinics.net/lists/linux-mm/msg20233.html">http://www.spinics.net/lists/linux-mm/msg20233.html</a> Proposed patch: <a href="http://www.spinics.net/lists/linux-mm/msg20301.html">http://www.spinics.net/lists/linux-mm/msg20301.html</a> Acknowledgements: Red Hat would like to thank Andrea Righi for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-710338 is considered to be moderate due to the potential race condition.
To fix REDHAT-BUG-710338, apply the latest patches provided by Red Hat for your Linux distribution.
REDHAT-BUG-710338 affects multiple versions of Red Hat Linux, so ensure your version is updated as indicated in the provided advisories.
No specific workaround is recommended for REDHAT-BUG-710338 beyond updating the system software.
REDHAT-BUG-710338 is a race condition vulnerability that occurs with the ksmd process.