We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-36891

maple_tree: fix mas_empty_area_rev() null pointer dereference



Description

In the Linux kernel, the following vulnerability has been resolved: maple_tree: fix mas_empty_area_rev() null pointer dereference Currently the code calls mas_start() followed by mas_data_end() if the maple state is MA_START, but mas_start() may return with the maple state node == NULL. This will lead to a null pointer dereference when checking information in the NULL node, which is done in mas_data_end(). Avoid setting the offset if there is no node by waiting until after the maple state is checked for an empty or single entry state. A user could trigger the events to cause a kernel oops by unmapping all vmas to produce an empty maple tree, then mapping a vma that would cause the scenario described above.

Reserved 2024-05-30 | Published 2024-05-30 | Updated 2024-12-19 | Assigner Linux

Product status

Default status
unaffected

54a611b605901c7d5d05b6b8f5d04a6ceb0962aa before 883e5d542bbdddbddeba60250cb482baf3ae2415
affected

54a611b605901c7d5d05b6b8f5d04a6ceb0962aa before 6c9c7c1e63b198a8b979ad963eb21410f10ccb00
affected

54a611b605901c7d5d05b6b8f5d04a6ceb0962aa before f3956791cf526540addd3295e4c1e0f0442486cc
affected

54a611b605901c7d5d05b6b8f5d04a6ceb0962aa before 955a923d2809803980ff574270f81510112be9cf
affected

Default status
affected

6.1
affected

Any version before 6.1
unaffected

6.1.94
unaffected

6.6.31
unaffected

6.8.10
unaffected

6.9
unaffected

References

git.kernel.org/...c/883e5d542bbdddbddeba60250cb482baf3ae2415

git.kernel.org/...c/6c9c7c1e63b198a8b979ad963eb21410f10ccb00

git.kernel.org/...c/f3956791cf526540addd3295e4c1e0f0442486cc

git.kernel.org/...c/955a923d2809803980ff574270f81510112be9cf

cve.org (CVE-2024-36891)

nvd.nist.gov (CVE-2024-36891)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-36891

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.