CVE-2024-38543
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
19/06/2024
Last modified:
29/08/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure<br />
<br />
The kcalloc() in dmirror_device_evict_chunk() will return null if the<br />
physical memory has run out. As a result, if src_pfns or dst_pfns is<br />
dereferenced, the null pointer dereference bug will happen.<br />
<br />
Moreover, the device is going away. If the kcalloc() fails, the pages<br />
mapping a chunk could not be evicted. So add a __GFP_NOFAIL flag in<br />
kcalloc().<br />
<br />
Finally, as there is no need to have physically contiguous memory, Switch<br />
kcalloc() to kvcalloc() in order to avoid failing allocations.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8 (including) | 6.1.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1a21fdeea502658e315bd939409b755974f4fb64
- https://git.kernel.org/stable/c/3b20d18f475bd17309db640dbe7d7c7ebb5bc2bc
- https://git.kernel.org/stable/c/65e528a69cb3ed4a286c45b4afba57461c8b5b33
- https://git.kernel.org/stable/c/c2af060d1c18beaec56351cf9c9bcbbc5af341a3
- https://git.kernel.org/stable/c/ce47e8ead9a72834cc68431d53f8092ce69bebb7



