Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early.
A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.
References
Link | Resource |
---|---|
https://security.freebsd.org/advisories/FreeBSD-SA-24:14.umtx.asc | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20240916-0001/ |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-09-05 05:15
Updated : 2024-11-21 09:35
NVD link : CVE-2024-43102
Mitre link : CVE-2024-43102
CVE.ORG link : CVE-2024-43102
JSON object : View
Products Affected
freebsd
- freebsd