We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-34777

dma-mapping: benchmark: fix node id validation



AssignerLinux
Reserved2024-06-21
Published2024-06-21
Updated2024-09-11

Description

In the Linux kernel, the following vulnerability has been resolved: dma-mapping: benchmark: fix node id validation While validating node ids in map_benchmark_ioctl(), node_possible() may be provided with invalid argument outside of [0,MAX_NUMNODES-1] range leading to: BUG: KASAN: wild-memory-access in map_benchmark_ioctl (kernel/dma/map_benchmark.c:214) Read of size 8 at addr 1fffffff8ccb6398 by task dma_map_benchma/971 CPU: 7 PID: 971 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #37 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:117) kasan_report (mm/kasan/report.c:603) kasan_check_range (mm/kasan/generic.c:189) variable_test_bit (arch/x86/include/asm/bitops.h:227) [inline] arch_test_bit (arch/x86/include/asm/bitops.h:239) [inline] _test_bit at (include/asm-generic/bitops/instrumented-non-atomic.h:142) [inline] node_state (include/linux/nodemask.h:423) [inline] map_benchmark_ioctl (kernel/dma/map_benchmark.c:214) full_proxy_unlocked_ioctl (fs/debugfs/file.c:333) __x64_sys_ioctl (fs/ioctl.c:890) do_syscall_64 (arch/x86/entry/common.c:83) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Compare node ids with sane bounds first. NUMA_NO_NODE is considered a special valid case meaning that benchmarking kthreads won't be bound to a cpuset of a given node. Found by Linux Verification Center (linuxtesting.org).

Product status

Default status
unaffected

65789daa8087 before 35d31c8bd472
affected

65789daa8087 before c57874265a3c
affected

65789daa8087 before 34a816d8735f
affected

65789daa8087 before 63e7e05a48a3
affected

65789daa8087 before 1ff05e723f7c
affected

Default status
affected

5.11
affected

Any version before 5.11
unaffected

5.15.161
unaffected

6.1.93
unaffected

6.6.33
unaffected

6.9.4
unaffected

6.10
unaffected

References

https://git.kernel.org/stable/c/35d31c8bd4722b107f5a2f5ddddce839de04b936

https://git.kernel.org/stable/c/c57874265a3c5206d7aece3793bb2fc9abcd7570

https://git.kernel.org/stable/c/34a816d8735f3924b74be8e5bf766ade1f3bd10b

https://git.kernel.org/stable/c/63e7e05a48a35308aeddd7ecccb68363a5988e87

https://git.kernel.org/stable/c/1ff05e723f7ca30644b8ec3fb093f16312e408ad

cve.org CVE-2024-34777

nvd.nist.gov CVE-2024-34777

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.