CVE-2024-41055

In the Linux kernel, the following vulnerability has been resolved: mm: prevent derefencing NULL ptr in pfn_section_valid() Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing memory_section->usage") changed pfn_section_valid() to add a READ_ONCE() call around "ms->usage" to fix a race with section_deactivate() where ms->usage can be cleared. The READ_ONCE() call, by itself, is not enough to prevent NULL pointer dereference. We need to check its value before dereferencing it.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:32

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982 - Patch () https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982 - Patch
References () https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7 - Patch () https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7 - Patch
References () https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e - Patch () https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e - Patch
References () https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509 - Patch () https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509 - Patch
References () https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63 - Patch () https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63 - Patch
References () https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503 - Patch () https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503 - Patch

22 Aug 2024, 14:11

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: evita la eliminación de la referencia NULL ptr en pfn_section_valid() La confirmación 5ec8e8ea8b77 ("mm/sparsemem: corrige la ejecución al acceder a la sección_memoria->uso") cambió pfn_section_valid() para agregar un READ_ONCE() llame a "ms->usage" para arreglar una ejecución con section_deactivate() donde se puede borrar ms->usage. La llamada READ_ONCE(), por sí sola, no es suficiente para evitar la desreferencia al puntero NULL. Necesitamos comprobar su valor antes de desreferenciarlo.
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982 - () https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982 - Patch
References () https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7 - () https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7 - Patch
References () https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e - () https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e - Patch
References () https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509 - () https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509 - Patch
References () https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63 - () https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63 - Patch
References () https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503 - () https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2024-11-21 09:32


NVD link : CVE-2024-41055

Mitre link : CVE-2024-41055

CVE.ORG link : CVE-2024-41055


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference