In the Linux kernel, the following vulnerability has been resolved:
powerpc/kasan: Limit KASAN thread size increase to 32KB
KASAN is seen to increase stack usage, to the point that it was reported
to lead to stack overflow on some 32-bit machines (see link).
To avoid overflows the stack size was doubled for KASAN builds in
commit 3e8635fb2e07 ("powerpc/kasan: Force thread size increase with
KASAN").
However with a 32KB stack size to begin with, the doubling leads to a
64KB stack, which causes build errors:
arch/powerpc/kernel/switch.S:249: Error: operand out of range (0x000000000000fe50 is not between 0xffffffffffff8000 and 0x0000000000007fff)
Although the asm could be reworked, in practice a 32KB stack seems
sufficient even for KASAN builds - the additional usage seems to be in
the 2-3KB range for a 64-bit KASAN build.
So only increase the stack for KASAN if the stack size is < 32KB.
References
Configurations
Configuration 1 (hide)
|
History
17 Mar 2025, 15:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-770 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/4297217bcf1f0948a19c2bacc6b68d92e7778ad9 - Patch | |
References | () https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb - Patch | |
References | () https://git.kernel.org/stable/c/b29b16bd836a838b7690f80e37f8376414c74cbe - Patch | |
References | () https://git.kernel.org/stable/c/f1acb109505d983779bbb7e20a1ee6244d2b5736 - Patch |
Information
Published : 2024-04-03 15:15
Updated : 2025-03-17 15:36
NVD link : CVE-2024-26710
Mitre link : CVE-2024-26710
CVE.ORG link : CVE-2024-26710
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-770
Allocation of Resources Without Limits or Throttling