![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-26759 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
mm/swap: fix race when skipping swapcache When skipping swapcache for
SWP_SYNCHRONOUS_IO, if two or more threads swapin the same entry at
the same time, they get different pages (A, B). Before one thread (T0)
finishes the swapin and installs page (A) to the PTE, another thread
(T1) could finish swapin of page (B), swap_free the entry, then swap
out the possibly modified page reusing the same entry. It breaks the
pte_same check in (T0) because PTE value is unchanged, causing ABA
problem. Thread (T0) will install a stalled page (A) into the PTE and
cause data corruption. One possible callstack is like this: CPU0 CPU1
---- ---- do_swap_page() do_swap_page() with same entry |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-26759 https://git.kernel.org/stable/c/13ddaf26be324a7f951891ecd9ccd04466d27458 https://git.kernel.org/stable/c/13ddaf26be324a7f951891ecd9ccd04466d27458 https://git.kernel.org/stable/c/2dedda77d4493f3e92e414b272bfa60f1f51ed95 https://git.kernel.org/stable/c/2dedda77d4493f3e92e414b272bfa60f1f51ed95 https://git.kernel.org/stable/c/305152314df82b22cf9b181f3dc5fc411002079a https://git.kernel.org/stable/c/305152314df82b22cf9b181f3dc5fc411002079a https://git.kernel.org/stable/c/d183a4631acfc7af955c02a02e739cec15f5234d https://git.kernel.org/stable/c/d183a4631acfc7af955c02a02e739cec15f5234d |