In the Linux kernel, the following vulnerability has been resolved:
regmap: maple: Fix cache corruption in regcache_maple_drop()
When keeping the upper end of a cache block entry, the entry[] array
must be indexed by the offset from the base register of the block,
i.e. max - mas.index.
The code was indexing entry[] by only the register address, leading
to an out-of-bounds access that copied some part of the kernel
memory over the cache contents.
This bug was not detected by the regmap KUnit test because it only
tests with a block of registers starting at 0, so mas.index == 0.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/00bb549d7d63a21532e76e4a334d7807a54d9f31 (6.9-rc3)
git.kernel.org/stable/c/00bb549d7d63a21532e76e4a334d7807a54d9f31
git.kernel.org/stable/c/3af6c5ac72dc5b721058132a0a1d7779e443175e
git.kernel.org/stable/c/51c4440b9d3fd7c8234e6de9170a487c03506e53
launchpad.net/bugs/cve/CVE-2024-36019
nvd.nist.gov/vuln/detail/CVE-2024-36019
security-tracker.debian.org/tracker/CVE-2024-36019
www.cve.org/CVERecord?id=CVE-2024-36019