A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.
Workaround:
If two threads of execution use a resource simultaneously, there exists the possibility that resources may be used while invalid, in turn making the state of execution undefined.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6901 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7077 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7539 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0412 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-4732 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2236982 | third party advisory issue tracking |