CVE-2024-43846

In the Linux kernel, the following vulnerability has been resolved: lib: objagg: Fix general protection fault The library supports aggregation of objects into other objects only if the parent object does not have a parent itself. That is, nesting is not supported. Aggregation happens in two cases: Without and with hints, where hints are a pre-computed recommendation on how to aggregate the provided objects. Nesting is not possible in the first case due to a check that prevents it, but in the second case there is no check because the assumption is that nesting cannot happen when creating objects based on hints. The violation of this assumption leads to various warnings and eventually to a general protection fault [1]. Before fixing the root cause, error out when nesting happens and warn. [1] general protection fault, probably for non-canonical address 0xdead000000000d90: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 1083 Comm: kworker/1:9 Tainted: G W 6.9.0-rc6-custom-gd9b4f1cca7fb #7 Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019 Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work RIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80 [...] Call Trace: <TASK> mlxsw_sp_acl_atcam_entry_add+0x256/0x3c0 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510 process_one_work+0x151/0x370 worker_thread+0x2cb/0x3e0 kthread+0xd0/0x100 ret_from_fork+0x34/0x50 ret_from_fork_asm+0x1a/0x30 </TASK>
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

25 Oct 2024, 19:52

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/1936fa05a180834c3b52e0439a6bddc07814d3eb - () https://git.kernel.org/stable/c/1936fa05a180834c3b52e0439a6bddc07814d3eb - Patch
References () https://git.kernel.org/stable/c/22ae17a267f4812861f0c644186c3421ff97dbfc - () https://git.kernel.org/stable/c/22ae17a267f4812861f0c644186c3421ff97dbfc - Patch
References () https://git.kernel.org/stable/c/499f742fed42e74f1321f4b12ca196a66a2b49fc - () https://git.kernel.org/stable/c/499f742fed42e74f1321f4b12ca196a66a2b49fc - Patch
References () https://git.kernel.org/stable/c/565213e005557eb6cc4e42189d26eb300e02f170 - () https://git.kernel.org/stable/c/565213e005557eb6cc4e42189d26eb300e02f170 - Patch
References () https://git.kernel.org/stable/c/5adc61d29bbb461d7f7c2b48dceaa90ecd182eb7 - () https://git.kernel.org/stable/c/5adc61d29bbb461d7f7c2b48dceaa90ecd182eb7 - Patch
References () https://git.kernel.org/stable/c/8161263362154cbebfbf4808097b956a6a8cb98a - () https://git.kernel.org/stable/c/8161263362154cbebfbf4808097b956a6a8cb98a - Patch
References () https://git.kernel.org/stable/c/b4a3a89fffcdf09702b1f161b914e52abca1894d - () https://git.kernel.org/stable/c/b4a3a89fffcdf09702b1f161b914e52abca1894d - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: lib: objagg: soluciona un fallo de protección general. La librería admite la agregación de objetos en otros objetos sólo si el objeto principal no tiene un padre en sí. Es decir, no se admite el anidamiento. La agregación ocurre en dos casos: sin y con sugerencias, donde las sugerencias son una recomendación calculada previamente sobre cómo agregar los objetos proporcionados. El anidamiento no es posible en el primer caso debido a una verificación que lo impide, pero en el segundo caso no hay verificación porque se supone que el anidamiento no puede ocurrir cuando se crean objetos basados en sugerencias. La violación de este supuesto conduce a diversas advertencias y eventualmente a un fallo de protección general [1]. Antes de solucionar la causa raíz, elimine el error cuando se produzca el anidamiento y advierta. [1] falla de protección general, probablemente para la dirección no canónica 0xdead000000000d90: 0000 [#1] CPU PREEMPT SMP PTI: 1 PID: 1083 Comm: kworker/1:9 Tainted: GW 6.9.0-rc6-custom-gd9b4f1cca7fb #7 Nombre del hardware: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 06/01/2019 Cola de trabajo: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work RIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80 [...] Rastreo de llamadas: acl_atcam_entry_add+0x256/0x3c0 mlxsw_sp_acl_tcam_entry_create+0x5e /0xa0 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510 Process_one_work+0x151/0x370 trabajador_thread+0x2cb/0x3e0 kthread+0xd0/0x100 x34/0x50 ret_from_fork_asm+0x1a/0x30

19 Aug 2024, 05:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/22ae17a267f4812861f0c644186c3421ff97dbfc -
  • () https://git.kernel.org/stable/c/565213e005557eb6cc4e42189d26eb300e02f170 -
  • () https://git.kernel.org/stable/c/8161263362154cbebfbf4808097b956a6a8cb98a -

17 Aug 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 10:15

Updated : 2024-10-25 19:52


NVD link : CVE-2024-43846

Mitre link : CVE-2024-43846

CVE.ORG link : CVE-2024-43846


JSON object : View

Products Affected

linux

  • linux_kernel