Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-57917— topology: Keep the cpumask unchanged when printing cpumap

EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-57917

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
topology: Keep the cpumask unchanged when printing cpumap
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: topology: Keep the cpumask unchanged when printing cpumap During fuzz testing, the following warning was discovered: different return values (15 and 11) from vsnprintf("%*pbl ", ...) test:keyward is WARNING in kvasprintf WARNING: CPU: 55 PID: 1168477 at lib/kasprintf.c:30 kvasprintf+0x121/0x130 Call Trace: kvasprintf+0x121/0x130 kasprintf+0xa6/0xe0 bitmap_print_to_buf+0x89/0x100 core_siblings_list_read+0x7e/0xb0 kernfs_file_read_iter+0x15b/0x270 new_sync_read+0x153/0x260 vfs_read+0x215/0x290 ksys_read+0xb9/0x160 do_syscall_64+0x56/0x100 entry_SYSCALL_64_after_hwframe+0x78/0xe2 The call trace shows that kvasprintf() reported this warning during the printing of core_siblings_list. kvasprintf() has several steps: (1) First, calculate the length of the resulting formatted string. (2) Allocate a buffer based on the returned length. (3) Then, perform the actual string formatting. (4) Check whether the lengths of the formatted strings returned in steps (1) and (2) are consistent. If the core_cpumask is modified between steps (1) and (3), the lengths obtained in these two steps may not match. Indeed our test includes cpu hotplugging, which should modify core_cpumask while printing. To fix this issue, cache the cpumask into a temporary variable before calling cpumap_print_{list, cpumask}_to_buf(), to keep it unchanged during the printing process.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于打印 cpumap 时 cpumask 会改变。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257 ~ 1c7818e2746e747838a3de1687e89eac7b947f08 -
LinuxLinux 5.15 -

II. Public POCs for CVE-2024-57917

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-57917

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-01-19 · 47 CVEs total

CVE-2024-57914usb: typec: tcpci: fix NULL pointer issue on shared irq case
CVE-2024-57918drm/amd/display: fix page fault due to max surface definition mismatch
CVE-2024-57921drm/amdgpu: Add a lock when accessing the buddy trim function
CVE-2024-57925ksmbd: fix a missing return value check bug
CVE-2024-57926drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err
CVE-2024-57928netfs: Fix enomem handling in buffered reads
CVE-2024-57927nfs: Fix oops in nfs_netfs_init_request() when copying to cache
CVE-2024-57929dm array: fix releasing a faulty array block twice in dm_array_cursor_end
CVE-2024-57923btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path
CVE-2024-57916misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling
CVE-2024-57919drm/amd/display: fix divide error in DM plane scale calcs
CVE-2024-57913usb: gadget: f_fs: Remove WARN_ON in functionfs_bind
CVE-2024-57912iio: pressure: zpa2326: fix information leak in triggered buffer
CVE-2024-57911iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer
CVE-2024-57910iio: light: vcnl4035: fix information leak in triggered buffer
CVE-2024-57908iio: imu: kmx61: fix information leak in triggered buffer
CVE-2024-57909iio: light: bh1745: fix information leak in triggered buffer
CVE-2024-57907iio: adc: rockchip_saradc: fix information leak in triggered buffer
CVE-2024-57905iio: adc: ti-ads1119: fix information leak in triggered buffer
CVE-2024-57906iio: adc: ti-ads8688: fix information leak in triggered buffer

Showing top 20 of 47 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-57917

No comments yet


Leave a comment