CVE-2024-26850
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2024
Last modified:
03/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/debug_vm_pgtable: fix BUG_ON with pud advanced test<br />
<br />
Architectures like powerpc add debug checks to ensure we find only devmap<br />
PUD pte entries. These debug checks are only done with CONFIG_DEBUG_VM. <br />
This patch marks the ptes used for PUD advanced test devmap pte entries so<br />
that we don&#39;t hit on debug checks on architecture like ppc64 as below.<br />
<br />
WARNING: CPU: 2 PID: 1 at arch/powerpc/mm/book3s64/radix_pgtable.c:1382 radix__pud_hugepage_update+0x38/0x138<br />
....<br />
NIP [c0000000000a7004] radix__pud_hugepage_update+0x38/0x138<br />
LR [c0000000000a77a8] radix__pudp_huge_get_and_clear+0x28/0x60<br />
Call Trace:<br />
[c000000004a2f950] [c000000004a2f9a0] 0xc000000004a2f9a0 (unreliable)<br />
[c000000004a2f980] [000d34c100000000] 0xd34c100000000<br />
[c000000004a2f9a0] [c00000000206ba98] pud_advanced_tests+0x118/0x334<br />
[c000000004a2fa40] [c00000000206db34] debug_vm_pgtable+0xcbc/0x1c48<br />
[c000000004a2fc10] [c00000000000fd28] do_one_initcall+0x60/0x388<br />
<br />
Also<br />
<br />
kernel BUG at arch/powerpc/mm/book3s64/pgtable.c:202!<br />
....<br />
<br />
NIP [c000000000096510] pudp_huge_get_and_clear_full+0x98/0x174<br />
LR [c00000000206bb34] pud_advanced_tests+0x1b4/0x334<br />
Call Trace:<br />
[c000000004a2f950] [000d34c100000000] 0xd34c100000000 (unreliable)<br />
[c000000004a2f9a0] [c00000000206bb34] pud_advanced_tests+0x1b4/0x334<br />
[c000000004a2fa40] [c00000000206db34] debug_vm_pgtable+0xcbc/0x1c48<br />
[c000000004a2fc10] [c00000000000fd28] do_one_initcall+0x60/0x388
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.6.21 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.9 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/720da1e593b85a550593b415bf1d79a053133451
- https://git.kernel.org/stable/c/d2a9510c0e39d06f5544075c13040407bdbf2803
- https://git.kernel.org/stable/c/eeeddf85fc58d48c58ad916e4ca12363ebd8ab21
- https://git.kernel.org/stable/c/720da1e593b85a550593b415bf1d79a053133451
- https://git.kernel.org/stable/c/d2a9510c0e39d06f5544075c13040407bdbf2803
- https://git.kernel.org/stable/c/eeeddf85fc58d48c58ad916e4ca12363ebd8ab21