We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | Linux |
Reserved | 2024-05-30 |
Published | 2024-05-30 |
Updated | 2024-08-02 |
In the Linux kernel, the following vulnerability has been resolved: maple_tree: fix mas_empty_area_rev() null pointer dereference Currently the code calls mas_start() followed by mas_data_end() if the maple state is MA_START, but mas_start() may return with the maple state node == NULL. This will lead to a null pointer dereference when checking information in the NULL node, which is done in mas_data_end(). Avoid setting the offset if there is no node by waiting until after the maple state is checked for an empty or single entry state. A user could trigger the events to cause a kernel oops by unmapping all vmas to produce an empty maple tree, then mapping a vma that would cause the scenario described above.
https://git.kernel.org/stable/c/883e5d542bbdddbddeba60250cb482baf3ae2415
https://git.kernel.org/stable/c/6c9c7c1e63b198a8b979ad963eb21410f10ccb00
https://git.kernel.org/stable/c/f3956791cf526540addd3295e4c1e0f0442486cc
https://git.kernel.org/stable/c/955a923d2809803980ff574270f81510112be9cf