DEBIAN-CVE-2024-42293

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2024-42293
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-42293.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-42293
Upstream
Published
2024-08-17T09:15:09Z
Modified
2025-09-19T06:27:23Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: arm64: mm: Fix lockless walks with static and dynamic page-table folding Lina reports random oopsen originating from the fast GUP code when 16K pages are used with 4-level page-tables, the fourth level being folded at runtime due to lack of LPA2. In this configuration, the generic implementation of p4doffsetlockless() will return a 'p4dt *' corresponding to the 'pgdt' allocated on the stack of the caller, gupfastpgdrange(). This is normally fine, but when the fourth level of page-table is folded at runtime, pudoffsetlockless() will offset from the address of the 'p4dt' to calculate the address of the PUD in the same page-table page. This results in a stray stack read when the 'p4dt' has been allocated on the stack and can send the walker into the weeds. Fix the problem by providing our own definition of p4doffsetlockless() when CONFIGPGTABLE_LEVELS <= 4 which returns the real page-table pointer rather than the address of the local stack variable.

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.3-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}