We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: maple_tree: fix mas_empty_area_rev() null pointer dereference Currently the code calls mas_start() followed by mas_data_end() if the maple state is MA_START, but mas_start() may return with the maple state node == NULL. This will lead to a null pointer dereference when checking information in the NULL node, which is done in mas_data_end(). Avoid setting the offset if there is no node by waiting until after the maple state is checked for an empty or single entry state. A user could trigger the events to cause a kernel oops by unmapping all vmas to produce an empty maple tree, then mapping a vma that would cause the scenario described above.
Reserved 2024-05-30 | Published 2024-05-30 | Updated 2024-12-19 | Assigner Linuxgit.kernel.org/...c/883e5d542bbdddbddeba60250cb482baf3ae2415
git.kernel.org/...c/6c9c7c1e63b198a8b979ad963eb21410f10ccb00
git.kernel.org/...c/f3956791cf526540addd3295e4c1e0f0442486cc
git.kernel.org/...c/955a923d2809803980ff574270f81510112be9cf
Support options