A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
The product does not properly "clean up" and remove temporary or supporting resources after they have been used.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2025726 | third party advisory issue tracking |
https://www.openwall.com/lists/oss-security/2021/11/25/1 | mailing list third party advisory exploit |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea | patch vendor advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890 | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | third party advisory mailing list |
https://www.debian.org/security/2022/dsa-5096 | third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | third party advisory patch |