[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024051738-CVE-2024-35846-d8bf@gregkh>
Date: Fri, 17 May 2024 16:47:39 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-35846: mm: zswap: fix shrinker NULL crash with cgroup_disable=memory
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
mm: zswap: fix shrinker NULL crash with cgroup_disable=memory
Christian reports a NULL deref in zswap that he bisected down to the zswap
shrinker. The issue also cropped up in the bug trackers of libguestfs [1]
and the Red Hat bugzilla [2].
The problem is that when memcg is disabled with the boot time flag, the
zswap shrinker might get called with sc->memcg == NULL. This is okay in
many places, like the lruvec operations. But it crashes in
memcg_page_state() - which is only used due to the non-node accounting of
cgroup's the zswap memory to begin with.
Nhat spotted that the memcg can be NULL in the memcg-disabled case, and I
was then able to reproduce the crash locally as well.
[1] https://github.com/libguestfs/libguestfs/issues/139
[2] https://bugzilla.redhat.com/show_bug.cgi?id=2275252
The Linux kernel CVE team has assigned CVE-2024-35846 to this issue.
Affected and fixed versions
===========================
Issue introduced in 6.8 with commit b5ba474f3f51 and fixed in 6.8.9 with commit b0fdabc908a7
Issue introduced in 6.8 with commit b5ba474f3f51 and fixed in 6.9 with commit 682886ec69d2
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2024-35846
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
mm/zswap.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/b0fdabc908a7f81d12382c87ca9e46a9c2e14042
https://git.kernel.org/stable/c/682886ec69d22363819a83ddddd5d66cb5c791e1
Powered by blists - more mailing lists