Executive Summary

Informations
Name CVE-2024-53113 First vendor Publication 2024-12-02
Vendor Cve Last vendor Modification 2024-12-14

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

mm: fix NULL pointer dereference in alloc_pages_bulk_noprof

We triggered a NULL pointer dereference for ac.preferred_zoneref->zone in alloc_pages_bulk_noprof() when the task is migrated between cpusets.

When cpuset is enabled, in prepare_alloc_pages(), ac->nodemask may be ¤t->mems_allowed. when first_zones_zonelist() is called to find preferred_zoneref, the ac->nodemask may be modified concurrently if the task is migrated between different cpusets. Assuming we have 2 NUMA Node, when traversing Node1 in ac->zonelist, the nodemask is 2, and when traversing Node2 in ac->zonelist, the nodemask is 1. As a result, the ac->preferred_zoneref points to NULL zone.

In alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() finds a allowable zone and calls zonelist_node_idx(ac.preferred_zoneref), leading to NULL pointer dereference.

__alloc_pages_noprof() fixes this issue by checking NULL pointer in commit ea57485af8f4 ("mm, page_alloc: fix check for NULL preferred_zone") and commit df76cee6bbeb ("mm, page_alloc: remove redundant checks from alloc fastpath").

To fix it, check NULL pointer for preferred_zoneref->zone.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3689

Sources (Detail)

https://git.kernel.org/stable/c/31502374627ba9ec3e710dbd0bb00457cc6d2c19
https://git.kernel.org/stable/c/6addb2d9501ec866d7b3a3b4e665307c437e9be2
https://git.kernel.org/stable/c/8ce41b0f9d77cca074df25afd39b86e2ee3aa68e
https://git.kernel.org/stable/c/903d896448c2e50e8652aaba529a30d4d1eaa0e5
https://git.kernel.org/stable/c/d0f16cec79774c3132df006cf771eddd89d08f58
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2025-03-29 03:43:39
  • Multiple Updates
2025-03-28 13:47:07
  • Multiple Updates
2025-03-28 03:21:25
  • Multiple Updates
2025-03-19 03:16:28
  • Multiple Updates
2025-03-18 03:29:27
  • Multiple Updates
2025-03-14 03:16:37
  • Multiple Updates
2025-03-06 14:13:10
  • Multiple Updates
2025-02-22 03:26:41
  • Multiple Updates
2025-01-08 03:07:34
  • Multiple Updates
2025-01-07 03:07:07
  • Multiple Updates
2024-12-25 03:05:42
  • Multiple Updates
2024-12-15 00:20:33
  • Multiple Updates
2024-12-12 00:20:45
  • Multiple Updates
2024-12-02 17:20:29
  • First insertion