In the Linux kernel, the following vulnerability has been resolved:
powerpc/kasan: Fix addr error caused by page alignment
In kasan_init_region, when k_start is not page aligned, at the begin of
for loop, k_cur = k_start & PAGE_MASK is less than k_start, and then
`va = block + k_cur - k_start` is less than block, the addr va is invalid,
because the memory address space from va to block is not alloced by
memblock_alloc, which will not be reserved by memblock_reserve later, it
will be used by other places.
As a result, memory overwriting occurs.
for example:
int __init __weak kasan_init_region(void *start, size_t size)
{
[...]
/* if say block(dcd97000) k_start(feef7400) k_end(feeff3fe) */
block = memblock_alloc(k_end - k_start, PAGE_SIZE);
[...]
for (k_cur = k_start & PAGE_MASK; k_cur < k_end; k_cur += PAGE_SIZE) {
/* at the begin of for loop
* block(dcd97000) va(dcd96c00) k_cur(feef7000) k_start(feef7400)
* va(dcd96c00) is less than block(dcd97000), va is invalid
*/
void *va = block + k_cur - k_start;
[...]
}
[...]
}
Therefore, page alignment is performed on k_start before
memblock_alloc() to ensure the validity of the VA address.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
08 Apr 2025, 15:30
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
First Time |
Debian
Linux linux Kernel Debian debian Linux Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe - Patch | |
References | () https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058 - Patch | |
References | () https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882 - Patch | |
References | () https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 - Patch | |
References | () https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 - Patch | |
References | () https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory |
21 Nov 2024, 09:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe - | |
References | () https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058 - | |
References | () https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882 - | |
References | () https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 - | |
References | () https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 - | |
References | () https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25 - |
05 Nov 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Apr 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-03 15:15
Updated : 2025-04-08 15:30
NVD link : CVE-2024-26712
Mitre link : CVE-2024-26712
CVE.ORG link : CVE-2024-26712
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE