113 Star 72 Fork 311

src-openEuler/kernel

CVE-2024-50279

已完成
CVE和安全问题 拥有者
创建于  
2024-11-19 10:32

一、漏洞信息
漏洞编号:CVE-2024-50279
漏洞归属组件:kernel
漏洞归属的版本:4.19.140,4.19.194,4.19.90,5.10.0,6.1.19,6.4.0,6.6.0
CVSS V3.0分值:
BaseScore:7.1 High
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
漏洞简述:
In the Linux kernel, the following vulnerability has been resolved:dm cache: fix out-of-bounds access to the dirty bitset when resizingdm-cache checks the dirty bits of the cache blocks to be dropped whenshrinking the fast device, but an index bug in bitset iteration causesout-of-bounds access.Reproduce steps:1. create a cache device of 1024 cache blocks (128 bytes dirty bitset)dmsetup create cmeta --table 0 8192 linear /dev/sdc 0 dmsetup create cdata --table 0 131072 linear /dev/sdc 8192 dmsetup create corig --table 0 524288 linear /dev/sdc 262144 dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=directdmsetup create cache --table 0 524288 cache /dev/mapper/cmeta /dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0 2. shrink the fast device to 512 cache blocks, triggering out-of-bounds access to the dirty bitset (offset 0x80)dmsetup suspend cachedmsetup reload cdata --table 0 65536 linear /dev/sdc 8192 dmsetup resume cdatadmsetup resume cacheKASAN reports: BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0 Read of size 8 at addr ffffc900000f3080 by task dmsetup/131 (...snip...) The buggy address belongs to the virtual mapping at [ffffc900000f3000, ffffc900000f5000) created by: cache_ctr+0x176a/0x35f0 (...snip...) Memory state around the buggy address: ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8Fix by making the index post-incremented.
漏洞公开时间:2024-11-19 10:16:30
漏洞创建时间:2024-11-19 10:32:26
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2024-50279

更多参考(点击展开)
参考来源 参考链接 来源链接
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/3b02c40ff10fdf83cc545850db208de855ebe22c
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/4fa4feb873cea0e9d6ff883b37cca6f33169d8b4
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/56507203e1b6127967ec2b51fb0b23a0d4af1334
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/792227719725497ce10a8039803bec13f89f8910
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/8501e38dc9e0060814c4085815fc83da3e6d43bf
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/e57648ce325fa405fe6bbd0e6a618ced7c301a2d
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/ee1f74925717ab36f6a091104c170639501ce818
416baaa9-dc9f-4396-8d5f-8c081fb06d67 https://git.kernel.org/stable/c/ff1dd8a04c30e8d4e2fd5c83198ca672eb6a9e7f
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-50279 https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2024-50279 https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/3b02c40ff10fdf83cc545850db208de855ebe22c https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/4fa4feb873cea0e9d6ff883b37cca6f33169d8b4 https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/56507203e1b6127967ec2b51fb0b23a0d4af1334 https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/792227719725497ce10a8039803bec13f89f8910 https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/8501e38dc9e0060814c4085815fc83da3e6d43bf https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/e57648ce325fa405fe6bbd0e6a618ced7c301a2d https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/ee1f74925717ab36f6a091104c170639501ce818 https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/stable/c/ff1dd8a04c30e8d4e2fd5c83198ca672eb6a9e7f https://bugzilla.suse.com/show_bug.cgi?id=1233468
suse_bugzilla https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-50279.mbox https://bugzilla.suse.com/show_bug.cgi?id=1233468
redhat_bugzilla https://lore.kernel.org/linux-cve-announce/2024111939-CVE-2024-50279-d3f9@gregkh/T https://bugzilla.redhat.com/show_bug.cgi?id=2327170
debian https://security-tracker.debian.org/tracker/CVE-2024-50279

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://git.kernel.org/stable/c/3b02c40ff10fdf83cc545850db208de855ebe22c nvd
https://git.kernel.org/stable/c/4fa4feb873cea0e9d6ff883b37cca6f33169d8b4 nvd
https://git.kernel.org/stable/c/56507203e1b6127967ec2b51fb0b23a0d4af1334 nvd
https://git.kernel.org/stable/c/792227719725497ce10a8039803bec13f89f8910 nvd
https://git.kernel.org/stable/c/8501e38dc9e0060814c4085815fc83da3e6d43bf nvd
https://git.kernel.org/stable/c/e57648ce325fa405fe6bbd0e6a618ced7c301a2d nvd
https://git.kernel.org/stable/c/ee1f74925717ab36f6a091104c170639501ce818 nvd
https://git.kernel.org/stable/c/ff1dd8a04c30e8d4e2fd5c83198ca672eb6a9e7f nvd

二、漏洞分析结构反馈
影响性分析说明:
Reserved.
openEuler评分:
7.1
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP4(4.19.90):受影响
2.openEuler-22.03-LTS-SP3(5.10.0):受影响
3.openEuler-22.03-LTS-SP4(5.10.0):受影响
4.openEuler-24.03-LTS(6.6.0):受影响
5.openEuler-24.03-LTS-SP1(6.6.0):受影响
6.master(6.6.0):不受影响
7.openEuler-24.03-LTS-Next(6.6.0):不受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP4(4.19.90):否
2.openEuler-22.03-LTS-SP1(5.10.0):否
3.openEuler-22.03-LTS-SP3(5.10.0):否
4.master(6.6.0):否
5.openEuler-24.03-LTS(6.6.0):否
6.openEuler-24.03-LTS-Next(6.6.0):否
7.openEuler-22.03-LTS-SP4(5.10.0):否
8.openEuler-24.03-LTS-SP1(6.6.0):否

原因说明:
1.openEuler-20.03-LTS-SP4(4.19.90):正常修复
2.openEuler-22.03-LTS-SP3(5.10.0):正常修复
3.openEuler-22.03-LTS-SP4(5.10.0):正常修复
4.openEuler-24.03-LTS(6.6.0):正常修复
5.openEuler-24.03-LTS-SP1(6.6.0):正常修复
6.master(6.6.0):不受影响-漏洞代码不能被攻击者触发
7.openEuler-24.03-LTS-Next(6.6.0):不受影响-漏洞代码不能被攻击者触发

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2025-1094

评论 (17)

登录 后才可以发表评论

状态
负责人
项目
分支
预计工期 (小时)
开始日期   -   截止日期
-
置顶选项
优先级
关联仓库
关联里程碑
关联分支
参与者(1)
5329419 openeuler ci bot 1632792936
1
https://gitee.com/src-openeuler/kernel.git
git@gitee.com:src-openeuler/kernel.git
src-openeuler
kernel
kernel

搜索帮助