In the Linux kernel, the following vulnerability has been resolved:
memblock: make memblocksetnode() also warn about use of MAX_NUMNODES
On an (old) x86 system with SRAT just covering space above 4Gb:
ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0xfffffffff] hotplug
the commit referenced below leads to this NUMA configuration no longer being refused by a CONFIG_NUMA=y kernel (previously
NUMA: nodes only cover 6144MB of your 8185MB e820 RAM. Not used.
No NUMA configuration found
Faking a node at [mem 0x0000000000000000-0x000000027fffffff]
was seen in the log directly after the message quoted above), because of memblockvalidatenumacoverage() checking for NUMANONODE (only). This in turn led to memblockallocrangenid()'s warning about MAXNUMNODES triggering, followed by a NULL deref in memmapinit() when trying to access node 64's (NODE_SHIFT=6) node data.
To compensate said change, make memblocksetnode() warn on and adjust a passed in value of MAX_NUMNODES, just like various other functions already do.
[
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e0eec24e2e199873f43df99ec39773ad3af2bff7",
"signature_type": "Line",
"target": {
"file": "mm/memblock.c"
},
"id": "CVE-2024-40917-28985c30",
"digest": {
"line_hashes": [
"272660939765790677638087800701862651556",
"190456233484622953296735111249364190758",
"139297346545167353230907938887935540166"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ddb7f966f3d06fcf1ba5ee298af6714b593584b",
"signature_type": "Function",
"target": {
"function": "memblock_set_node",
"file": "mm/memblock.c"
},
"id": "CVE-2024-40917-289d8e3e",
"digest": {
"length": 358.0,
"function_hash": "127302264967853951841710228344922788089"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4ddb7f966f3d06fcf1ba5ee298af6714b593584b",
"signature_type": "Line",
"target": {
"file": "mm/memblock.c"
},
"id": "CVE-2024-40917-5dbf88dc",
"digest": {
"line_hashes": [
"272660939765790677638087800701862651556",
"190456233484622953296735111249364190758",
"139297346545167353230907938887935540166"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22f742b8f738918f683198a18ec3c691acda14c4",
"signature_type": "Line",
"target": {
"file": "mm/memblock.c"
},
"id": "CVE-2024-40917-90ebdb08",
"digest": {
"line_hashes": [
"272660939765790677638087800701862651556",
"190456233484622953296735111249364190758",
"139297346545167353230907938887935540166"
],
"threshold": 0.9
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e0eec24e2e199873f43df99ec39773ad3af2bff7",
"signature_type": "Function",
"target": {
"function": "memblock_set_node",
"file": "mm/memblock.c"
},
"id": "CVE-2024-40917-94de2d61",
"digest": {
"length": 358.0,
"function_hash": "127302264967853951841710228344922788089"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@22f742b8f738918f683198a18ec3c691acda14c4",
"signature_type": "Function",
"target": {
"function": "memblock_set_node",
"file": "mm/memblock.c"
},
"id": "CVE-2024-40917-ccd74f4d",
"digest": {
"length": 358.0,
"function_hash": "127302264967853951841710228344922788089"
},
"deprecated": false
}
]