A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.
Workaround:
The product makes resources available to untrusted parties when those resources are only intended to be accessed by the product.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2023:6583 | vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7077 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2023:7370 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-0443 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2257968 | third party advisory issue tracking |
https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/ | mailing list |