| Summary | In the Linux kernel, the following vulnerability has been resolved: fork: do not invoke uffd on fork if error occurs Patch series "fork: do not expose incomplete mm on fork". During fork we may place the virtual memory address space into an In addition, we may encounter an error during the fork operation that As a result, we should not be exposing it in any way to external machinery We specifically update the fork logic to defer khugepaged and ksm to the This patch (of 2): Currently on fork we expose the virtual address space of a process to This is performed in dup_userfaultfd_complete() which is invoked This is problematic, because the virtual address space may not yet be The change in commit d24062914837 ("fork: use __mt_dup() to duplicate We address this by, on fork error, ensuring that we roll back state that We do this by implementing a new function, dup_userfaultfd_fail(), which Note that we perform mmgrab() on the parent and child mm's, however |
|---|---|
| Publication Date | Nov. 9, 2024, 8:15 p.m. |
| Registration Date | Nov. 10, 2024, 5:01 a.m. |
| Last Update | Nov. 12, 2024, 10:56 p.m. |
| Title | Linux の Linux Kernel における Time-of-check Time-of-use (TOCTOU) 競合状態の脆弱性 |
|---|---|
| Summary | Linux の Linux Kernel には、Time-of-check Time-of-use (TOCTOU) 競合状態の脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Oct. 28, 2024, midnight |
| Registration Date | Oct. 16, 2025, 6:10 p.m. |
| Last Update | Oct. 16, 2025, 6:10 p.m. |
| Linux |
| Linux Kernel 6.12 |
| Linux Kernel 6.8 以上 6.11.7 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2025年10月16日] 掲載 |
Oct. 16, 2025, 6:09 p.m. |