Race Condition Affecting kernel-cross-headers package, versions <0:4.18.0-477.64.1.el8_8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELCROSSHEADERS-7557130
- published 24 Jul 2024
- disclosed 3 Apr 2024
Introduced: 3 Apr 2024
CVE-2023-52639 Open this link in a new tabHow to fix?
Upgrade RHEL:8
kernel-cross-headers
to version 0:4.18.0-477.64.1.el8_8 or higher.
This issue was patched in RHSA-2024:4740
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-cross-headers
package and not the kernel-cross-headers
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
KVM: s390: vsie: fix race during shadow creation
Right now it is possible to see gmap->private being zero in kvm_s390_vsie_gmap_notifier resulting in a crash. This is due to the fact that we add gmap->private == kvm after creation:
static int acquire_gmap_shadow(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) { [...] gmap = gmap_shadow(vcpu->arch.gmap, asce, edat); if (IS_ERR(gmap)) return PTR_ERR(gmap); gmap->private = vcpu->kvm;
Let children inherit the private field of the parent.
References
- https://access.redhat.com/security/cve/CVE-2023-52639
- https://git.kernel.org/stable/c/28bb27824f25f36e5f80229a358d66ee09244082
- https://git.kernel.org/stable/c/5df3b81a567eb565029563f26f374ae3803a1dfc
- https://git.kernel.org/stable/c/f5572c0323cf8b4f1f0618178648a25b8fb8a380
- https://git.kernel.org/stable/c/fe752331d4b361d43cfd0b89534b4b2176057c32