Executive Summary

Informations
Name CVE-2024-46847 First vendor Publication 2024-09-27
Vendor Cve Last vendor Modification 2024-10-02

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

mm: vmalloc: ensure vmap_block is initialised before adding to queue

Commit 8c61291fd850 ("mm: fix incorrect vbq reference in purge_fragmented_block") extended the 'vmap_block' structure to contain a 'cpu' field which is set at allocation time to the id of the initialising CPU.

When a new 'vmap_block' is being instantiated by new_vmap_block(), the partially initialised structure is added to the local 'vmap_block_queue' xarray before the 'cpu' field has been initialised. If another CPU is concurrently walking the xarray (e.g. via vm_unmap_aliases()), then it may perform an out-of-bounds access to the remote queue thanks to an uninitialised index.

This has been observed as UBSAN errors in Android:

| Internal error: UBSAN: array index out of bounds: 00000000f2005512 [#1] PREEMPT SMP
|
| Call trace:
| purge_fragmented_block+0x204/0x21c
| _vm_unmap_aliases+0x170/0x378
| vm_unmap_aliases+0x1c/0x28
| change_memory_common+0x1dc/0x26c
| set_memory_ro+0x18/0x24
| module_enable_ro+0x98/0x238
| do_init_module+0x1b0/0x310

Move the initialisation of 'vb->cpu' in new_vmap_block() ahead of the addition to the xarray.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46847

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-129 Improper Validation of Array Index

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3676

Sources (Detail)

https://git.kernel.org/stable/c/1b2770e27d6d952f491bb362b657e5b2713c3efd
https://git.kernel.org/stable/c/3e3de7947c751509027d26b679ecd243bc9db255
https://git.kernel.org/stable/c/6cf74e0e5e3ab5d5c9defb4c73dad54d52224671
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2025-03-29 03:40:50
  • Multiple Updates
2025-03-28 13:45:12
  • Multiple Updates
2025-03-28 03:18:53
  • Multiple Updates
2025-03-19 03:14:12
  • Multiple Updates
2025-03-18 03:27:09
  • Multiple Updates
2025-03-14 03:14:26
  • Multiple Updates
2025-03-06 14:10:58
  • Multiple Updates
2025-02-22 03:24:32
  • Multiple Updates
2025-01-08 03:05:32
  • Multiple Updates
2025-01-07 03:05:05
  • Multiple Updates
2024-12-25 03:03:43
  • Multiple Updates
2024-12-12 03:06:39
  • Multiple Updates
2024-11-23 03:03:35
  • Multiple Updates
2024-11-22 03:01:45
  • Multiple Updates
2024-11-20 03:00:04
  • Multiple Updates
2024-11-14 03:00:22
  • Multiple Updates
2024-11-09 03:00:23
  • Multiple Updates
2024-10-26 02:57:45
  • Multiple Updates
2024-10-25 02:59:37
  • Multiple Updates
2024-10-23 02:58:50
  • Multiple Updates
2024-10-02 21:27:29
  • Multiple Updates
2024-09-30 17:27:26
  • Multiple Updates
2024-09-27 17:27:23
  • First insertion