In the Linux kernel, the following vulnerability has been resolved:
mm: multi-gen LRU: fix crash during cgroup migration
lrugenmigratemm() assumes lrugenaddmm() runs prior to itself. This isn't true for the following scenario:
CPU 1 CPU 2
clone() cgroupcanfork() cgroupprocswrite() cgrouppostfork() tasklock() lrugenmigratemm() taskunlock() tasklock() lrugenaddmm() taskunlock()
And when the above happens, kernel crashes because of linked list corruption (mmstruct->lrugen.list).
[
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04448022311cebd30969d3aebdde765f1258b360",
"target": {
"file": "mm/vmscan.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2023-52940-85fee606",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"121006313525359513121572838991695926313",
"262768049021246703576999640325638571562",
"210866022903847097983005574344006291461",
"118330401920928701026263605040755510049",
"121522977608741433463707268895471964210",
"324759242496940587366248604549556661088",
"313593788656260653338970365869134717336",
"276562049445123484520781788738006779714",
"20380443218771843440247736686884312903"
]
}
},
{
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@de08eaa6156405f2e9369f06ba5afae0e4ab3b62",
"target": {
"file": "mm/vmscan.c"
},
"deprecated": false,
"signature_version": "v1",
"id": "CVE-2023-52940-8b149a34",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"121006313525359513121572838991695926313",
"262768049021246703576999640325638571562",
"210866022903847097983005574344006291461",
"118330401920928701026263605040755510049",
"121522977608741433463707268895471964210",
"324759242496940587366248604549556661088",
"313593788656260653338970365869134717336",
"276562049445123484520781788738006779714",
"20380443218771843440247736686884312903"
]
}
}
]