CVE-2024-38543

Source
https://cve.org/CVERecord?id=CVE-2024-38543
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38543.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-38543
Downstream
Related
Published
2024-06-19T13:35:17.994Z
Modified
2026-03-13T07:55:53.123343Z
Summary
lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure
Details

In the Linux kernel, the following vulnerability has been resolved:

lib/testhmm.c: handle srcpfns and dst_pfns allocation failure

The kcalloc() in dmirrordeviceevictchunk() will return null if the physical memory has run out. As a result, if srcpfns or dst_pfns is dereferenced, the null pointer dereference bug will happen.

Moreover, the device is going away. If the kcalloc() fails, the pages mapping a chunk could not be evicted. So add a _GFPNOFAIL flag in kcalloc().

Finally, as there is no need to have physically contiguous memory, Switch kcalloc() to kvcalloc() in order to avoid failing allocations.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38543.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b2ef9f5a5cb37643ca5def3516c546457074b882
Fixed
1a21fdeea502658e315bd939409b755974f4fb64
Fixed
65e528a69cb3ed4a286c45b4afba57461c8b5b33
Fixed
ce47e8ead9a72834cc68431d53f8092ce69bebb7
Fixed
3b20d18f475bd17309db640dbe7d7c7ebb5bc2bc
Fixed
c2af060d1c18beaec56351cf9c9bcbbc5af341a3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-38543.json"