Bug 2324623 (CVE-2024-50207) - CVE-2024-50207 kernel: ring-buffer: Fix reader locking when changing the sub buffer order
Summary: CVE-2024-50207 kernel: ring-buffer: Fix reader locking when changing the sub ...
Keywords:
Status: NEW
Alias: CVE-2024-50207
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2324670
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-11-08 13:49 UTC by OSIDB Bzimport
Modified: 2024-11-21 18:54 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2024-11-08 13:49:07 UTC
In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix reader locking when changing the sub buffer order

The function ring_buffer_subbuf_order_set() updates each
ring_buffer_per_cpu and installs new sub buffers that match the requested
page order. This operation may be invoked concurrently with readers that
rely on some of the modified data, such as the head bit (RB_PAGE_HEAD), or
the ring_buffer_per_cpu.pages and reader_page pointers. However, no
exclusive access is acquired by ring_buffer_subbuf_order_set(). Modifying
the mentioned data while a reader also operates on them can then result in
incorrect memory access and various crashes.

Fix the problem by taking the reader_lock when updating a specific
ring_buffer_per_cpu in ring_buffer_subbuf_order_set().


Note You need to log in before you can comment on or make changes to this bug.