CVE-2024-57934

In the Linux kernel, the following vulnerability has been resolved: fgraph: Add READ_ONCE() when accessing fgraph_array[] In __ftrace_return_to_handler(), a loop iterates over the fgraph_array[] elements, which are fgraph_ops. The loop checks if an element is a fgraph_stub to prevent using a fgraph_stub afterward. However, if the compiler reloads fgraph_array[] after this check, it might race with an update to fgraph_array[] that introduces a fgraph_stub. This could result in the stub being processed, but the stub contains a null "func_hash" field, leading to a NULL pointer dereference. To ensure that the gops compared against the fgraph_stub matches the gops processed later, add a READ_ONCE(). A similar patch appears in commit 63a8dfb ("function_graph: Add READ_ONCE() when accessing fgraph_array[]").
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*

History

03 Feb 2025, 14:52

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.7
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fgraph: Agregar READ_ONCE() al acceder a fgraph_array[] En __ftrace_return_to_handler(), un bucle itera sobre los elementos fgraph_array[], que son fgraph_ops. El bucle comprueba si un elemento es un fgraph_stub para evitar usar un fgraph_stub después. Sin embargo, si el compilador vuelve a cargar fgraph_array[] después de esta comprobación, podría competir con una actualización a fgraph_array[] que introduce un fgraph_stub. Esto podría dar como resultado que se procese el stub, pero que este contenga un campo "func_hash" nulo, lo que lleva a una desreferencia de puntero NULL. Para garantizar que los gops comparados con fgraph_stub coincidan con los gops procesados ??más tarde, agregue un READ_ONCE(). Un parche similar aparece en el commit 63a8dfb ("function_graph: Agregar READ_ONCE() al acceder a fgraph_array[]").
References () https://git.kernel.org/stable/c/b68b2a3fbacc7be720ef589d489bcacdd05c6d38 - () https://git.kernel.org/stable/c/b68b2a3fbacc7be720ef589d489bcacdd05c6d38 - Patch
References () https://git.kernel.org/stable/c/d65474033740ded0a4fe9a097fce72328655b41d - () https://git.kernel.org/stable/c/d65474033740ded0a4fe9a097fce72328655b41d - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
CWE CWE-476

21 Jan 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-21 12:15

Updated : 2025-02-03 14:52


NVD link : CVE-2024-57934

Mitre link : CVE-2024-57934

CVE.ORG link : CVE-2024-57934


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference