Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published Dec 28, 2024 to the GitHub Advisory Database • Updated Dec 28, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex

Reservation of the PMU hardware is done at first event creation
and is protected by a pair of mutex_lock() and mutex_unlock().
After reservation of the PMU hardware the memory
required for the PMUs the event is to be installed on is
allocated by allocate_buffers() and alloc_sampling_buffer().
This done outside of the mutex protection.
Without mutex protection two or more concurrent invocations of
perf_event_init() may run in parallel.
This can lead to allocation of Sample Data Blocks (SDBs)
multiple times for the same PMU.
Prevent this and protect memory allocation of SDBs by
mutex.

References

Published by the National Vulnerability Database Dec 28, 2024
Published to the GitHub Advisory Database Dec 28, 2024
Last updated Dec 28, 2024

Severity

Unknown

Weaknesses

No CWEs

CVE ID

CVE-2024-56706

GHSA ID

GHSA-m2p9-vjrp-wj7v

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.