In the Linux kernel, the following vulnerability has been resolved:
sched/membarrier: reduce the ability to hammer on sys_membarrier
On some systems, sys_membarrier can be very expensive, causing overall
slowdowns for everything. So put a lock on the path in order to
serialize the accesses to prevent the ability for this to be called at
too high of a frequency and saturate the machine.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 2 - Kernel-5.10 Extra | kernel | 2024-03-27 21:47 | ALAS2KERNEL-5.10-2024-053 |
Amazon Linux 2 - Kernel-5.15 Extra | kernel | 2024-02-29 00:58 | ALAS2KERNEL-5.15-2024-039 |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2024-03-27 21:47 | ALAS2KERNEL-5.4-2024-062 |
Amazon Linux 2 - Core | kernel | 2024-04-24 22:15 | ALAS2-2024-2525 |
Amazon Linux 2023 | kernel | 2024-02-29 10:29 | ALAS2023-2024-549 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 3.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L |
NVD | CVSSv3 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |