FreeBSD Vulnerability Security Update Advisory (CVE-2024-43102)
Overview
An update has been released to address vulnerabilities in FreeBSD. Users of the affected versions are advised to update to the latest version.
Affected Products
CVE-2024-43102
- FreeBSD 14.1-STABLE previous version
- FreeBSD 14.1-RELEASE-p4 previous version
- FreeBSD 14.0-RELEASE-p10 previous version
- FreeBSD 13.4-STABLE previous version
- FreeBSD 13.4-RC2-p1 previous version
- FreeBSD 13.3-RELEASE-p6 previous version
Resolved Vulnerabilities
Parallel execution of a UMTX_SHM_DESTROY subrequest could cause the reference count of a mapping object to be excessively decremented, resulting in the object being freed prematurely, which could lead to a kernel panic or Use-After-Free attack (CVE-2024-43102)
Vulnerability Patches
The following product-specific Vulnerability Patches were made available in the September 4, 2024 update.
For more information on Vulnerability Patches, please refer to the “V. Solution” section of the product-specific Referenced Sites documentation.
CVE-2024-43102
- FreeBSD 14.1-STABLE version
- FreeBSD 14.1-RELEASE-p4 version
- FreeBSD 14.0-RELEASE-p10 version
- FreeBSD 13.4-STABLE version
- FreeBSD 13.4-RC2-p1 version
- FreeBSD 13.3-RELEASE-p6 version
References
[1] CVE-2024-43102 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-43102
[2] umtx Kernel panic or Use-After-Free
https://www.freebsd.org/security/advisories/FreeBSD-SA-24:14.umtx.asc