CVE-2024-46713

In the Linux kernel, the following vulnerability has been resolved: perf/aux: Fix AUX buffer serialization Ole reported that event->mmap_mutex is strictly insufficient to serialize the AUX buffer, add a per RB mutex to fully serialize it. Note that in the lock order comment the perf_event::mmap_mutex order was already wrong, that is, it nesting under mmap_lock is not new with this patch.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*

History

03 Nov 2025, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html -
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

26 Sep 2025, 18:50

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: perf/aux: Se corrige la serialización del búfer AUX. Ole informó que event->mmap_mutex es estrictamente insuficiente para serializar el búfer AUX, agregue un mutex por RB para serializarlo por completo. Tenga en cuenta que en el comentario de orden de bloqueo, el orden perf_event::mmap_mutex ya estaba mal, es decir, su anidación bajo mmap_lock no es nueva con este parche.
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a - () https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a - Patch
References () https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff - () https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff - Patch
References () https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82 - () https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82 - Patch
References () https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d - () https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d - Patch
References () https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370 - () https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370 - Patch
References () https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef - () https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787

13 Sep 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-13 15:15

Updated : 2025-11-03 23:15


NVD link : CVE-2024-46713

Mitre link : CVE-2024-46713

CVE.ORG link : CVE-2024-46713


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write