In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex Reservation of the PMU hardware is done at first event creation and is protected by a pair of mutex_lock() and mutex_unlock(). After reservation of the PMU hardware the memory required for the PMUs the event is to be installed on is allocated by allocate_buffers() and alloc_sampling_buffer(). This done outside of the mutex protection. Without mutex protection two or more concurrent invocations of perf_event_init() may run in parallel. This can lead to allocation of Sample Data Blocks (SDBs) multiple times for the same PMU. Prevent this and protect memory allocation of SDBs by mutex.
History

Mon, 30 Dec 2024 01:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Sat, 28 Dec 2024 10:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex Reservation of the PMU hardware is done at first event creation and is protected by a pair of mutex_lock() and mutex_unlock(). After reservation of the PMU hardware the memory required for the PMUs the event is to be installed on is allocated by allocate_buffers() and alloc_sampling_buffer(). This done outside of the mutex protection. Without mutex protection two or more concurrent invocations of perf_event_init() may run in parallel. This can lead to allocation of Sample Data Blocks (SDBs) multiple times for the same PMU. Prevent this and protect memory allocation of SDBs by mutex.
Title s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-12-28T09:46:27.297Z

Updated: 2025-05-04T10:02:56.177Z

Reserved: 2024-12-27T15:00:39.856Z

Link: CVE-2024-56706

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2024-12-28T10:15:19.400

Modified: 2024-12-28T10:15:19.400

Link: CVE-2024-56706

cve-icon Redhat

Severity : Low

Publid Date: 2024-12-28T00:00:00Z

Links: CVE-2024-56706 - Bugzilla