Assigner | Linux |
Reserved | 2024-05-30 |
Published | 2024-05-30 |
Updated | 2024-06-16 |
Description
In the Linux kernel, the following vulnerability has been resolved: maple_tree: fix mas_empty_area_rev() null pointer dereference Currently the code calls mas_start() followed by mas_data_end() if the maple state is MA_START, but mas_start() may return with the maple state node == NULL. This will lead to a null pointer dereference when checking information in the NULL node, which is done in mas_data_end(). Avoid setting the offset if there is no node by waiting until after the maple state is checked for an empty or single entry state. A user could trigger the events to cause a kernel oops by unmapping all vmas to produce an empty maple tree, then mapping a vma that would cause the scenario described above.
Product status
54a611b60590 before 883e5d542bbd
54a611b60590 before 6c9c7c1e63b1
54a611b60590 before f3956791cf52
54a611b60590 before 955a923d2809
6.1
Any version before 6.1
6.1.94
6.6.31
6.8.10
6.9
References
https://git.kernel.org/stable/c/883e5d542bbdddbddeba60250cb482baf3ae2415
https://git.kernel.org/stable/c/6c9c7c1e63b198a8b979ad963eb21410f10ccb00
https://git.kernel.org/stable/c/f3956791cf526540addd3295e4c1e0f0442486cc
https://git.kernel.org/stable/c/955a923d2809803980ff574270f81510112be9cf