CVE-2024-26798

Source
https://cve.org/CVERecord?id=CVE-2024-26798
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26798.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26798
Downstream
Related
Published
2024-04-04T08:20:27.195Z
Modified
2026-03-14T12:27:42.052496Z
Summary
fbcon: always restore the old font data in fbcon_do_set_font()
Details

In the Linux kernel, the following vulnerability has been resolved:

fbcon: always restore the old font data in fbcondoset_font()

Commit a5a923038d70 (fbdev: fbcon: Properly revert changes when vcresize() failed) started restoring old font data upon failure (of vcresize()). But it performs so only for user fonts. It means that the "system"/internal fonts are not restored at all. So in result, the very first call to fbcondosetfont() performs no restore at all upon failing vcresize().

This can be reproduced by Syzkaller to crash the system on the next invocation of fontget(). It's rather hard to hit the allocation failure in vcresize() on the first fontset(), but not impossible. Esp. if fault injection is used to aid the execution/failure. It was demonstrated by Sirius: BUG: unable to handle page fault for address: fffffffffffffff8 #PF: supervisor read access in kernel mode #PF: errorcode(0x0000) - not-present page PGD cb7b067 P4D cb7b067 PUD cb7d067 PMD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 8007 Comm: poc Not tainted 6.7.0-g9d1694dc91ce #20 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 RIP: 0010:fbcongetfont+0x229/0x800 drivers/video/fbdev/core/fbcon.c:2286 Call Trace: <TASK> confontget drivers/tty/vt/vt.c:4558 [inline] confontop+0x1fc/0xf20 drivers/tty/vt/vt.c:4673 vtkioctl drivers/tty/vt/vtioctl.c:474 [inline] vtioctl+0x632/0x2ec0 drivers/tty/vt/vtioctl.c:752 ttyioctl+0x6f8/0x1570 drivers/tty/ttyio.c:2803 vfsioctl fs/ioctl.c:51 [inline] ...

So restore the font data in any case, not only for user fonts. Note the later 'if' is now protected by 'olduserfont' and not 'olddata' as the latter is always set now. (And it is supposed to be non-NULL. Otherwise we would see the bug above again.)

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26798.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
868749a7456dc48e93887a8474194e2ee6d6c21f
Fixed
ae68f57df3335679653868fafccd8c88ef84ae98
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ebd6f886aa2447fcfcdce5450c9e1028e1d681bb
Fixed
20a4b5214f7bee13c897477168c77bbf79683c3d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a5a923038d70d2d4a86cb4e3f32625a5ee6e7e24
Fixed
2f91a96b892fab2f2543b4a55740c5bee36b1a6b
Fixed
73a6bd68a1342f3a44cac9dffad81ad6a003e520
Fixed
a2c881413dcc5d801bdc9535e51270cc88cb9cd8
Fixed
00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
f08ccb792d3eaf1dc62d8cbf6a30d6522329f660

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26798.json"