• 公告ID (KylinSec-SA-2024-2540)

摘要:

In the Linux kernel, the following vulnerability has been resolved:maple_tree: fix mas_empty_area_rev() null pointer dereferenceCurrently the code calls mas_start() followed by mas_data_end() if themaple state is MA_START, but mas_start() may return with the maple statenode == NULL. This will lead to a null pointer dereference when checkinginformation in the NULL node, which is done in mas_data_end().Avoid setting the offset if there is no node by waiting until after themaple state is checked for an empty or single entry state.A user could trigger the events to cause a kernel oops by unmapping allvmas to produce an empty maple tree, then mapping a vma that would causethe scenario described above.

安全等级: Low

公告ID: KylinSec-SA-2024-2540

发布日期: 2024年6月1日

关联CVE: CVE-2024-36891  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:maple_tree: fix mas_empty_area_rev() null pointer dereferenceCurrently the code calls mas_start() followed by mas_data_end() if themaple state is MA_START, but mas_start() may return with the maple statenode == NULL. This will lead to a null pointer dereference when checkinginformation in the NULL node, which is done in mas_data_end().Avoid setting the offset if there is no node by waiting until after themaple state is checked for an empty or single entry state.A user could trigger the events to cause a kernel oops by unmapping allvmas to produce an empty maple tree, then mapping a vma that would causethe scenario described above.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-36891 KY3.4-4A kernel Unaffected
CVE-2024-36891 KY3.4-5A kernel Unaffected
CVE-2024-36891 KY3.5.1 kernel Unaffected
CVE-2024-36891 KY3.5.2 kernel Unaffected
CVE-2024-36891 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-2539 下一篇:KylinSec-SA-2024-2541