CVE-2024-35872

Source
https://cve.org/CVERecord?id=CVE-2024-35872
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35872.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35872
Downstream
Related
Published
2024-05-19T08:34:30.096Z
Modified
2026-03-23T05:06:35.079914938Z
Summary
mm/secretmem: fix GUP-fast succeeding on secretmem folios
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix GUP-fast succeeding on secretmem folios

folioissecretmem() currently relies on secretmem folios being LRU folios, to save some cycles.

However, folios might reside in a folio batch without the LRU flag set, or temporarily have their LRU flag cleared. Consequently, the LRU flag is unreliable for this purpose.

In particular, this is the case when secretmemfault() allocates a fresh page and calls filemapaddfolio()->folioaddlru(). The folio might be added to the per-cpu folio batch and won't get the LRU flag set until the batch was drained using e.g., lruadd_drain().

Consequently, folioissecretmem() might not detect secretmem folios and GUP-fast can succeed in grabbing a secretmem folio, crashing the kernel when we would later try reading/writing to the folio, because the folio has been unmapped from the directmap.

Fix it by removing that unreliable check.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35872.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1507f51255c9ff07d75909a84e7c0d7f3c4b2f49
Fixed
6564b014af92b677c1f07c44d7f5b595d589cf6e
Fixed
9c2b4b657739ecda38e3b383354a29566955ac48
Fixed
43fad1d0284de30159661d0badfc3cbaf7e6f8f8
Fixed
201e4aaf405dfd1308da54448654053004c579b5
Fixed
65291dcfcf8936e1b23cfd7718fdfde7cfaf7706

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35872.json"