CVE-2024-36000

In the Linux kernel, the following vulnerability has been resolved: mm/hugetlb: fix missing hugetlb_lock for resv uncharge There is a recent report on UFFDIO_COPY over hugetlb: https://lore.kernel.org/all/000000000000ee06de0616177560@google.com/ 350: lockdep_assert_held(&hugetlb_lock); Should be an issue in hugetlb but triggered in an userfault context, where it goes into the unlikely path where two threads modifying the resv map together. Mike has a fix in that path for resv uncharge but it looks like the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd() will update the cgroup pointer, so it requires to be called with the lock held.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*

History

23 Sep 2025, 18:23

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CWE CWE-617
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc - () https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc - Patch
References () https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10 - () https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10 - Patch
References () https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2 - () https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2 - Patch
References () https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505 - () https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505 - Patch

Information

Published : 2024-05-20 10:15

Updated : 2025-09-23 18:23


NVD link : CVE-2024-36000

Mitre link : CVE-2024-36000

CVE.ORG link : CVE-2024-36000


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-617

Reachable Assertion