lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <2025030610-CVE-2024-58081-5d47@gregkh> Date: Thu, 6 Mar 2025 17:14:14 +0100 From: Greg Kroah-Hartman <gregkh@...uxfoundation.org> To: linux-cve-announce@...r.kernel.org Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org> Subject: CVE-2024-58081: clk: mmp2: call pm_genpd_init() only after genpd.name is set Description =========== In the Linux kernel, the following vulnerability has been resolved: clk: mmp2: call pm_genpd_init() only after genpd.name is set Setting the genpd's struct device's name with dev_set_name() is happening within pm_genpd_init(). If it remains NULL, things can blow up later, such as when crafting the devfs hierarchy for the power domain: Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read ... Call trace: strlen from start_creating+0x90/0x138 start_creating from debugfs_create_dir+0x20/0x178 debugfs_create_dir from genpd_debug_add.part.0+0x4c/0x144 genpd_debug_add.part.0 from genpd_debug_init+0x74/0x90 genpd_debug_init from do_one_initcall+0x5c/0x244 do_one_initcall from kernel_init_freeable+0x19c/0x1f4 kernel_init_freeable from kernel_init+0x1c/0x12c kernel_init from ret_from_fork+0x14/0x28 Bisecting tracks this crash back to commit 899f44531fe6 ("pmdomain: core: Add GENPD_FLAG_DEV_NAME_FW flag"), which exchanges use of genpd->name with dev_name(&genpd->dev) in genpd_debug_add.part(). The Linux kernel CVE team has assigned CVE-2024-58081 to this issue. Affected and fixed versions =========================== Issue introduced in 6.12 with commit 899f44531fe6cac4b024710fec647ecc127724b8 and fixed in 6.12.14 with commit eca01d5911fb34218d10a58d8d9534b758c8fd0a Issue introduced in 6.12 with commit 899f44531fe6cac4b024710fec647ecc127724b8 and fixed in 6.13.3 with commit 763517124e27b07fa300b486d7d13c5d563a215e Issue introduced in 6.12 with commit 899f44531fe6cac4b024710fec647ecc127724b8 and fixed in 6.14-rc1 with commit e24b15d4704dcb73920c3d18a6157abd18df08c1 Issue introduced in 6.11.10 with commit 94a03c0400c9696735184c7d76630b818d0f5cca Please see https://www.kernel.org for a full list of currently supported kernel versions by the kernel community. Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=CVE-2024-58081 will be updated if fixes are backported, please check that for the most up to date information about this issue. Affected files ============== The file(s) affected by this issue are: drivers/clk/mmp/pwr-island.c Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual changes to resolve this issue can be found at these commits: https://git.kernel.org/stable/c/eca01d5911fb34218d10a58d8d9534b758c8fd0a https://git.kernel.org/stable/c/763517124e27b07fa300b486d7d13c5d563a215e https://git.kernel.org/stable/c/e24b15d4704dcb73920c3d18a6157abd18df08c1
Powered by blists - more mailing lists