Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-42243 | First vendor Publication | 2024-08-07 |
Vendor | Cve | Last vendor Modification | 2024-08-08 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 5.5 | ||
Base Score | 5.5 | Environmental Score | 5.5 |
impact SubScore | 3.6 | Temporal Score | 5.5 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the Linux kernel, the following vulnerability has been resolved: mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray Patch series "mm/filemap: Limit page cache size to that supported by xarray", v2. Currently, xarray can't support arbitrary page cache size. More details can be found from the WARN_ON() statement in xas_split_alloc(). In our test whose code is attached below, we hit the WARN_ON() on ARM64 system where the base page size is 64KB and huge page size is 512MB. The issue was reported long time ago and some discussions on it can be found here [1]. [1] https://www.spinics.net/lists/linux-xfs/msg75404.html In order to fix the issue, we need to adjust MAX_PAGECACHE_ORDER to one supported by xarray and avoid PMD-sized page cache if needed. The code changes are suggested by David Hildenbrand. PATCH[1] adjusts MAX_PAGECACHE_ORDER to that supported by xarray PATCH[2-3] avoids PMD-sized page cache in the synchronous readahead path PATCH[4] avoids PMD-sized page cache for shmem files if needed Test program ============ # cat test.c #define _GNU_SOURCE #include #define TEST_XFS_FILENAME "/tmp/data" #define TEST_SHMEM_FILENAME "/dev/shm/data" #define TEST_MEM_SIZE 0x20000000 int main(int argc, char **argv) { const char *filename; if (pgsize != 0x10000) { system("echo force > /sys/kernel/mm/transparent_hugepage/shmem_enabled"); /* Open xfs or shmem file */ fd = open(filename, O_CREAT | O_RDWR | O_TRUNC); /* Extend file size */ /* Create VMA */ fprintf(stdout, "mapped buffer at 0x%p\n", buf); /* Populate VMA */ /* Punch the file to enforce xarray split */ cleanup: return 0; } # gcc test.c -o test # cat /proc/1/smaps | grep KernelPageSize | head -n 1 KernelPageSize: 64 kB # ./test shmem |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42243 |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-03-29 03:39:03 |
|
2025-03-28 13:43:54 |
|
2025-03-28 03:17:27 |
|
2025-03-19 03:12:50 |
|
2025-03-18 03:25:45 |
|
2025-03-14 03:13:04 |
|
2025-03-06 14:09:35 |
|
2025-02-22 03:23:06 |
|
2025-01-08 03:04:14 |
|
2025-01-07 03:03:47 |
|
2024-12-25 03:02:24 |
|
2024-12-12 03:05:20 |
|
2024-11-23 03:02:25 |
|
2024-11-22 03:00:36 |
|
2024-11-20 02:58:56 |
|
2024-11-14 02:59:15 |
|
2024-11-09 02:59:16 |
|
2024-10-26 02:56:40 |
|
2024-10-25 02:58:34 |
|
2024-10-23 02:57:47 |
|
2024-10-03 02:53:05 |
|
2024-10-02 02:51:29 |
|
2024-09-15 02:49:11 |
|
2024-09-12 02:48:43 |
|
2024-09-07 02:47:43 |
|
2024-09-06 02:46:53 |
|
2024-09-04 02:50:05 |
|
2024-08-22 02:47:57 |
|
2024-08-08 21:27:32 |
|
2024-08-08 00:27:22 |
|
2024-08-07 21:27:25 |
|