CVE-2024-41055
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
29/07/2024
Last modified:
22/08/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm: prevent derefencing NULL ptr in pfn_section_valid()<br />
<br />
Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing<br />
memory_section->usage") changed pfn_section_valid() to add a READ_ONCE()<br />
call around "ms->usage" to fix a race with section_deactivate() where<br />
ms->usage can be cleared. The READ_ONCE() call, by itself, is not enough<br />
to prevent NULL pointer dereference. We need to check its value before<br />
dereferencing it.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.219 (including) | 5.10.222 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.149 (including) | 5.15.163 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.76 (including) | 6.1.100 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.15 (including) | 6.6.41 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.9.10 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0100aeb8a12d51950418e685f879cc80cb8e5982
- https://git.kernel.org/stable/c/797323d1cf92d09b7a017cfec576d9babf99cde7
- https://git.kernel.org/stable/c/82f0b6f041fad768c28b4ad05a683065412c226e
- https://git.kernel.org/stable/c/941e816185661bf2b44b488565d09444ae316509
- https://git.kernel.org/stable/c/adccdf702b4ea913ded5ff512239e382d7473b63
- https://git.kernel.org/stable/c/bc17f2377818dca643a74499c3f5333500c90503