CVE-2024-34777

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
21/06/2024
Last modified:
17/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dma-mapping: benchmark: fix node id validation<br /> <br /> While validating node ids in map_benchmark_ioctl(), node_possible() may<br /> be provided with invalid argument outside of [0,MAX_NUMNODES-1] range<br /> leading to:<br /> <br /> BUG: KASAN: wild-memory-access in map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)<br /> Read of size 8 at addr 1fffffff8ccb6398 by task dma_map_benchma/971<br /> CPU: 7 PID: 971 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #37<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)<br /> Call Trace:<br /> <br /> dump_stack_lvl (lib/dump_stack.c:117)<br /> kasan_report (mm/kasan/report.c:603)<br /> kasan_check_range (mm/kasan/generic.c:189)<br /> variable_test_bit (arch/x86/include/asm/bitops.h:227) [inline]<br /> arch_test_bit (arch/x86/include/asm/bitops.h:239) [inline]<br /> _test_bit at (include/asm-generic/bitops/instrumented-non-atomic.h:142) [inline]<br /> node_state (include/linux/nodemask.h:423) [inline]<br /> map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)<br /> full_proxy_unlocked_ioctl (fs/debugfs/file.c:333)<br /> __x64_sys_ioctl (fs/ioctl.c:890)<br /> do_syscall_64 (arch/x86/entry/common.c:83)<br /> entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)<br /> <br /> Compare node ids with sane bounds first. NUMA_NO_NODE is considered a<br /> special valid case meaning that benchmarking kthreads won&amp;#39;t be bound to a<br /> cpuset of a given node.<br /> <br /> Found by Linux Verification Center (linuxtesting.org).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.161 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.9.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*