cve-2024-42241
Vulnerability from cvelistv5
Published
2024-08-07 15:14
Modified
2024-11-05 09:38
Severity ?
Summary
mm/shmem: disable PMD-sized page cache if needed
Impacted products
Vendor Product Version
Linux Linux Version: 5.17
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42241",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:13:47.790188Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:31.583Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "mm/shmem.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "93893eacb372",
              "status": "affected",
              "version": "6b24ca4a1a8d",
              "versionType": "git"
            },
            {
              "lessThan": "cd25208ca9b0",
              "status": "affected",
              "version": "6b24ca4a1a8d",
              "versionType": "git"
            },
            {
              "lessThan": "9fd154ba926b",
              "status": "affected",
              "version": "6b24ca4a1a8d",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "mm/shmem.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.17"
            },
            {
              "lessThan": "5.17",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.41",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/shmem: disable PMD-sized page cache if needed\n\nFor shmem files, it\u0027s possible that PMD-sized page cache can\u0027t be\nsupported by xarray.  For example, 512MB page cache on ARM64 when the base\npage size is 64KB can\u0027t be supported by xarray.  It leads to errors as the\nfollowing messages indicate when this sort of xarray entry is split.\n\nWARNING: CPU: 34 PID: 7578 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\nModules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6   \\\nnft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject        \\\nnft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4  \\\nip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse xfs  \\\nlibcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net \\\nnet_failover virtio_console virtio_blk failover dimlib virtio_mmio\nCPU: 34 PID: 7578 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9\nHardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\npstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\npc : xas_split_alloc+0xf8/0x128\nlr : split_huge_page_to_list_to_order+0x1c4/0x720\nsp : ffff8000882af5f0\nx29: ffff8000882af5f0 x28: ffff8000882af650 x27: ffff8000882af768\nx26: 0000000000000cc0 x25: 000000000000000d x24: ffff00010625b858\nx23: ffff8000882af650 x22: ffffffdfc0900000 x21: 0000000000000000\nx20: 0000000000000000 x19: ffffffdfc0900000 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000018000000000 x15: 52f8004000000000\nx14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020\nx11: 52f8000000000000 x10: 52f8e1c0ffff6000 x9 : ffffbeb9619a681c\nx8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff00010b02ddb0\nx5 : ffffbeb96395e378 x4 : 0000000000000000 x3 : 0000000000000cc0\nx2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\nCall trace:\n xas_split_alloc+0xf8/0x128\n split_huge_page_to_list_to_order+0x1c4/0x720\n truncate_inode_partial_folio+0xdc/0x160\n shmem_undo_range+0x2bc/0x6a8\n shmem_fallocate+0x134/0x430\n vfs_fallocate+0x124/0x2e8\n ksys_fallocate+0x4c/0xa0\n __arm64_sys_fallocate+0x24/0x38\n invoke_syscall.constprop.0+0x7c/0xd8\n do_el0_svc+0xb4/0xd0\n el0_svc+0x44/0x1d8\n el0t_64_sync_handler+0x134/0x150\n el0t_64_sync+0x17c/0x180\n\nFix it by disabling PMD-sized page cache when HPAGE_PMD_ORDER is larger\nthan MAX_PAGECACHE_ORDER.  As Matthew Wilcox pointed, the page cache in a\nshmem file isn\u0027t represented by a multi-index entry and doesn\u0027t have this\nlimitation when the xarry entry is split until commit 6b24ca4a1a8d (\"mm:\nUse multi-index entries in the page cache\")."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-05T09:38:53.654Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/93893eacb372b0a4a30f7de6609b08c3ba6c4fd9"
        },
        {
          "url": "https://git.kernel.org/stable/c/cd25208ca9b0097f8e079d692fc678f36fdbc3f9"
        },
        {
          "url": "https://git.kernel.org/stable/c/9fd154ba926b34c833b7bfc4c14ee2e931b3d743"
        }
      ],
      "title": "mm/shmem: disable PMD-sized page cache if needed",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-42241",
    "datePublished": "2024-08-07T15:14:28.547Z",
    "dateReserved": "2024-07-30T07:40:12.254Z",
    "dateUpdated": "2024-11-05T09:38:53.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-42241\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-07T16:15:46.920\",\"lastModified\":\"2024-08-08T14:53:50.763\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmm/shmem: disable PMD-sized page cache if needed\\n\\nFor shmem files, it\u0027s possible that PMD-sized page cache can\u0027t be\\nsupported by xarray.  For example, 512MB page cache on ARM64 when the base\\npage size is 64KB can\u0027t be supported by xarray.  It leads to errors as the\\nfollowing messages indicate when this sort of xarray entry is split.\\n\\nWARNING: CPU: 34 PID: 7578 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128\\nModules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6   \\\\\\nnft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject        \\\\\\nnft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4  \\\\\\nip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse xfs  \\\\\\nlibcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net \\\\\\nnet_failover virtio_console virtio_blk failover dimlib virtio_mmio\\nCPU: 34 PID: 7578 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9\\nHardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024\\npstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\\npc : xas_split_alloc+0xf8/0x128\\nlr : split_huge_page_to_list_to_order+0x1c4/0x720\\nsp : ffff8000882af5f0\\nx29: ffff8000882af5f0 x28: ffff8000882af650 x27: ffff8000882af768\\nx26: 0000000000000cc0 x25: 000000000000000d x24: ffff00010625b858\\nx23: ffff8000882af650 x22: ffffffdfc0900000 x21: 0000000000000000\\nx20: 0000000000000000 x19: ffffffdfc0900000 x18: 0000000000000000\\nx17: 0000000000000000 x16: 0000018000000000 x15: 52f8004000000000\\nx14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020\\nx11: 52f8000000000000 x10: 52f8e1c0ffff6000 x9 : ffffbeb9619a681c\\nx8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff00010b02ddb0\\nx5 : ffffbeb96395e378 x4 : 0000000000000000 x3 : 0000000000000cc0\\nx2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000\\nCall trace:\\n xas_split_alloc+0xf8/0x128\\n split_huge_page_to_list_to_order+0x1c4/0x720\\n truncate_inode_partial_folio+0xdc/0x160\\n shmem_undo_range+0x2bc/0x6a8\\n shmem_fallocate+0x134/0x430\\n vfs_fallocate+0x124/0x2e8\\n ksys_fallocate+0x4c/0xa0\\n __arm64_sys_fallocate+0x24/0x38\\n invoke_syscall.constprop.0+0x7c/0xd8\\n do_el0_svc+0xb4/0xd0\\n el0_svc+0x44/0x1d8\\n el0t_64_sync_handler+0x134/0x150\\n el0t_64_sync+0x17c/0x180\\n\\nFix it by disabling PMD-sized page cache when HPAGE_PMD_ORDER is larger\\nthan MAX_PAGECACHE_ORDER.  As Matthew Wilcox pointed, the page cache in a\\nshmem file isn\u0027t represented by a multi-index entry and doesn\u0027t have this\\nlimitation when the xarry entry is split until commit 6b24ca4a1a8d (\\\"mm:\\nUse multi-index entries in the page cache\\\").\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/shmem: deshabilite la cach\u00e9 de p\u00e1ginas de tama\u00f1o PMD si es necesario. Para archivos shmem, es posible que xarray no admita la cach\u00e9 de p\u00e1ginas de tama\u00f1o PMD. Por ejemplo, xarray no puede admitir una memoria cach\u00e9 de p\u00e1gina de 512 MB en ARM64 cuando el tama\u00f1o de p\u00e1gina base es de 64 KB. Genera errores, ya que los siguientes mensajes indican cuando se divide este tipo de entrada de matriz x. ADVERTENCIA: CPU: 34 PID: 7578 en lib/xarray.c:1025 xas_split_alloc+0xf8/0x128 M\u00f3dulos vinculados en: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 \\\\ nft_fib nft_reject_inet nf_reject_ipv4 ject_ipv6 nft_reject \\\\ nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 \\\\ ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse xfs \\\\ libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net \\\\ net_failover virtio_console virtio_blk failover dimlib virtio_mmio CPU: 34 PID: 7578 Comm: test Kdump: cargado Contaminado: GW 6.10.0-rc5-gavin+ #9 Nombre del hardware: M\u00e1quina virtual QEMU KVM, Bios EDK2-20240524-1.EL9 24/05/2024 PSTATE: 83400005 (NZCV DAIF +PAN -UAO +TCO +DIT -SSBS BTYPE =-) PC: xas_split_alloc +0xf8/0x128 Lr: Split_huge_Page_To_List_To_Order +0x1c4/0x1c4/0x1c4/0x1c420 ffff8000882af5f0 x29: ffff8000882af5f0 x28: ffff8000882af650 x27: ffff8000882af768 x26: 0000000000000cc0 x25: 000000000000000d x24: 5b858 x23: ffff8000882af650 x22: ffffffdfc0900000 x21: 000000000000000 x20: 0000000000000000 x19: ffffffdfc0900000 x18: 00000000000000000 x1 7: 0000000000000000 x16: 0000018000000000 x15: 52f8004000000000 x14: 0000e00000000000 x13 : 0000000000002000 x12: 0000000000000020 x11: 52f8000000000000 x10: 52f8e1c0ffff6000 x9 : ffffbeb9619a681c x8 : 0000000000000003 x7 : 0000000000000 x6: ffff00010b02ddb0 x5: ffffbeb96395e378 x4: 000000000000000 x3: 0000000000000cc0 x2: 000000000000000d x1: 000000000000000 0c x0: 0000000000000000 Rastreo de llamadas: xas_split_alloc+0xf8/0x128 split_huge_page_to_list_to_order +0x1c4/0x720 truncate_inode_partial_folio+0xdc/0x160 shmem_undo_range+0x2bc/0x6a8 shmem_fallocate+0x134/0x430 vfs_fallocate+0x124/0x2e8 ksys_fallocate+0x4c/0xa0 __arm64_sys_fallo cate+0x24/0x38 invoke_syscall.constprop.0+0x7c/0xd8 do_el0_svc+0xb4/0xd0 el0_svc+ 0x44/0x1d8 el0t_64_sync_handler+0x134/0x150 el0t_64_sync+0x17c/0x180 Soluci\u00f3nelo deshabilitando el cach\u00e9 de p\u00e1ginas de tama\u00f1o PMD cuando HPAGE_PMD_ORDER es mayor que MAX_PAGECACHE_ORDER. Como se\u00f1al\u00f3 Matthew Wilcox, la cach\u00e9 de p\u00e1gina en un archivo shmem no est\u00e1 representada por una entrada de \u00edndice m\u00faltiple y no tiene esta limitaci\u00f3n cuando la entrada xarry se divide hasta el commit 6b24ca4a1a8d (\\\"mm: use entradas de \u00edndice m\u00faltiple en la p\u00e1gina cache\\\").\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.17\",\"versionEndExcluding\":\"6.6.41\",\"matchCriteriaId\":\"C6D591C1-AEB0-4E97-9BAD-4ECDED47C02D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.10\",\"matchCriteriaId\":\"AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/93893eacb372b0a4a30f7de6609b08c3ba6c4fd9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9fd154ba926b34c833b7bfc4c14ee2e931b3d743\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/cd25208ca9b0097f8e079d692fc678f36fdbc3f9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Mailing List\",\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.