
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in the Linux kernel's memory management subsystem (CVE-2023-52935) was identified affecting versions from 4.8 up to 6.1.11. The issue involves a race condition in the mm/khugepaged component related to anon_vma handling during page table operations (NVD).
The vulnerability occurs when an anon_vma is attached to the VMA (Virtual Memory Area), where collapse_and_free_pmd() requires it to be locked. The issue arises because retract_page_tables() checks for an attached anon_vma before holding the mmap lock, leading to a potential race condition. If an existing anon_vma is racily merged from a neighboring VMA, subsequent rmap traversals can access page tables that are being concurrently removed. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Debian).
The vulnerability can result in use-after-free access and causes a lockdep warning in collapse_and_free_pmd() with the message 'lockdep_assert_held_write(&vma->anon_vma->root->rwsem)'. This could potentially lead to system memory corruption and compromise the security of the affected system (NVD).
The vulnerability has been fixed in Linux kernel version 6.1.11 and later. Users are advised to upgrade to a patched version. Debian has released fixes in version 6.1.129-1 for bookworm and 6.12.21-1 for sid/trixie distributions (Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."