CVE-2024-26947

Source
https://cve.org/CVERecord?id=CVE-2024-26947
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26947.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-26947
Downstream
Related
Published
2024-05-01T05:18:17.316Z
Modified
2026-03-14T12:30:04.480634Z
Summary
ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses
Details

In the Linux kernel, the following vulnerability has been resolved:

ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses

Since commit a4d5613c4dc6 ("arm: extend pfnvalid to take into account freed memory map alignment") changes the semantics of pfnvalid() to check presence of the memory map for a PFN. A valid page for an address which is reserved but not mapped by the kernel[1], the system crashed during some uio test with the following memory layout:

node 0: [mem 0x00000000c0a00000-0x00000000cc8fffff] node 0: [mem 0x00000000d0000000-0x00000000da1fffff] the uio layout is:0xc0900000, 0x100000

the crash backtrace like:

Unable to handle kernel paging request at virtual address bff00000 [...] CPU: 1 PID: 465 Comm: startapp.bin Tainted: G O 5.10.0 #1 Hardware name: Generic DT based system PC is at b15flushkerndcachearea+0x24/0x3c LR is at __syncicachedcache+0x6c/0x98 [...] (b15flushkerndcachearea) from (__syncicachedcache+0x6c/0x98) (__syncicachedcache) from (setpteat+0x28/0x54) (setpteat) from (remappfnrange+0x1a0/0x274) (remappfnrange) from (uiommap+0x184/0x1b8 [uio]) (uiommap [uio]) from (__mmap_region+0x264/0x5f4) (__mmap_region) from (__dommapmm+0x3ec/0x440) (__dommapmm) from (dommap+0x50/0x58) (dommap) from (vmmmappgoff+0xfc/0x188) (vmmmappgoff) from (ksysmmappgoff+0xac/0xc4) (ksysmmappgoff) from (retfastsyscall+0x0/0x5c) Code: e0801001 e2423001 e1c00003 f57ff04f (ee070f3e) ---[ end trace 09cf0734c3805d52 ]--- Kernel panic - not syncing: Fatal exception

So check if PG_reserved was set to solve this issue.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26947.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a4d5613c4dc6d413e0733e37db9d116a2a36b9f3
Fixed
0c027c2bad7f5111c51a358b5d392e1a695dabff
Fixed
9f7ddc222cae8254e93d5c169a8ae11a49d912a7
Fixed
fb3a122a978626b33de3367ee1762da934c0f512
Fixed
0c66c6f4e21cb22220cbd8821c5c73fc157d20dc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
6026d4032dbbe3d7f4ac2c8daa923fe74dcf41c4
Last affected
65c578935bcc26ddc04e6757b2c7be95bf235b31

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26947.json"