CVE-2024-26712

In the Linux kernel, the following vulnerability has been resolved: powerpc/kasan: Fix addr error caused by page alignment In kasan_init_region, when k_start is not page aligned, at the begin of for loop, k_cur = k_start & PAGE_MASK is less than k_start, and then `va = block + k_cur - k_start` is less than block, the addr va is invalid, because the memory address space from va to block is not alloced by memblock_alloc, which will not be reserved by memblock_reserve later, it will be used by other places. As a result, memory overwriting occurs. for example: int __init __weak kasan_init_region(void *start, size_t size) { [...] /* if say block(dcd97000) k_start(feef7400) k_end(feeff3fe) */ block = memblock_alloc(k_end - k_start, PAGE_SIZE); [...] for (k_cur = k_start & PAGE_MASK; k_cur < k_end; k_cur += PAGE_SIZE) { /* at the begin of for loop * block(dcd97000) va(dcd96c00) k_cur(feef7000) k_start(feef7400) * va(dcd96c00) is less than block(dcd97000), va is invalid */ void *va = block + k_cur - k_start; [...] } [...] } Therefore, page alignment is performed on k_start before memblock_alloc() to ensure the validity of the VA address.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

08 Apr 2025, 15:30

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Debian
Linux linux Kernel
Debian debian Linux
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe - () https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe - Patch
References () https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058 - () https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058 - Patch
References () https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882 - () https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882 - Patch
References () https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 - () https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 - Patch
References () https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 - () https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 - Patch
References () https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25 - () https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory

21 Nov 2024, 09:02

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe - () https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe -
References () https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058 - () https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058 -
References () https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882 - () https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882 -
References () https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 - () https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6 -
References () https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 - () https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 -
References () https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25 - () https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25 -

05 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.4

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

03 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-03 15:15

Updated : 2025-04-08 15:30


NVD link : CVE-2024-26712

Mitre link : CVE-2024-26712

CVE.ORG link : CVE-2024-26712


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel