CVE-2024-57917 (GCVE-0-2024-57917)
Vulnerability from cvelistv5
Published
2025-01-19 11:52
Modified
2025-05-04 10:06
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: topology: Keep the cpumask unchanged when printing cpumap During fuzz testing, the following warning was discovered: different return values (15 and 11) from vsnprintf("%*pbl ", ...) test:keyward is WARNING in kvasprintf WARNING: CPU: 55 PID: 1168477 at lib/kasprintf.c:30 kvasprintf+0x121/0x130 Call Trace: kvasprintf+0x121/0x130 kasprintf+0xa6/0xe0 bitmap_print_to_buf+0x89/0x100 core_siblings_list_read+0x7e/0xb0 kernfs_file_read_iter+0x15b/0x270 new_sync_read+0x153/0x260 vfs_read+0x215/0x290 ksys_read+0xb9/0x160 do_syscall_64+0x56/0x100 entry_SYSCALL_64_after_hwframe+0x78/0xe2 The call trace shows that kvasprintf() reported this warning during the printing of core_siblings_list. kvasprintf() has several steps: (1) First, calculate the length of the resulting formatted string. (2) Allocate a buffer based on the returned length. (3) Then, perform the actual string formatting. (4) Check whether the lengths of the formatted strings returned in steps (1) and (2) are consistent. If the core_cpumask is modified between steps (1) and (3), the lengths obtained in these two steps may not match. Indeed our test includes cpu hotplugging, which should modify core_cpumask while printing. To fix this issue, cache the cpumask into a temporary variable before calling cpumap_print_{list, cpumask}_to_buf(), to keep it unchanged during the printing process.
Impacted products
Vendor Product Version
Linux Linux Version: bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257
Version: bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257
Version: bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257
Version: bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257
Version: bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/base/topology.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "1c7818e2746e747838a3de1687e89eac7b947f08",
              "status": "affected",
              "version": "bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257",
              "versionType": "git"
            },
            {
              "lessThan": "ca47e933a900492d89dcf5db18a99c28bd4a742d",
              "status": "affected",
              "version": "bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257",
              "versionType": "git"
            },
            {
              "lessThan": "b02cf1d27e460ab2b3e1c8c9ce472d562cad2e8d",
              "status": "affected",
              "version": "bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257",
              "versionType": "git"
            },
            {
              "lessThan": "360596e7fe319a5db1b5fb34a3952862ae53c924",
              "status": "affected",
              "version": "bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257",
              "versionType": "git"
            },
            {
              "lessThan": "cbd399f78e23ad4492c174fc5e6b3676dba74a52",
              "status": "affected",
              "version": "bb9ec13d156e85dfd6a8afd0bb61ccf5736ed257",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/base/topology.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.15"
            },
            {
              "lessThan": "5.15",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.177",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.125",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.72",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.177",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.125",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.72",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.10",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13",
                  "versionStartIncluding": "5.15",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntopology: Keep the cpumask unchanged when printing cpumap\n\nDuring fuzz testing, the following warning was discovered:\n\n different return values (15 and 11) from vsnprintf(\"%*pbl\n \", ...)\n\n test:keyward is WARNING in kvasprintf\n WARNING: CPU: 55 PID: 1168477 at lib/kasprintf.c:30 kvasprintf+0x121/0x130\n Call Trace:\n  kvasprintf+0x121/0x130\n  kasprintf+0xa6/0xe0\n  bitmap_print_to_buf+0x89/0x100\n  core_siblings_list_read+0x7e/0xb0\n  kernfs_file_read_iter+0x15b/0x270\n  new_sync_read+0x153/0x260\n  vfs_read+0x215/0x290\n  ksys_read+0xb9/0x160\n  do_syscall_64+0x56/0x100\n  entry_SYSCALL_64_after_hwframe+0x78/0xe2\n\nThe call trace shows that kvasprintf() reported this warning during the\nprinting of core_siblings_list. kvasprintf() has several steps:\n\n (1) First, calculate the length of the resulting formatted string.\n\n (2) Allocate a buffer based on the returned length.\n\n (3) Then, perform the actual string formatting.\n\n (4) Check whether the lengths of the formatted strings returned in\n     steps (1) and (2) are consistent.\n\nIf the core_cpumask is modified between steps (1) and (3), the lengths\nobtained in these two steps may not match. Indeed our test includes cpu\nhotplugging, which should modify core_cpumask while printing.\n\nTo fix this issue, cache the cpumask into a temporary variable before\ncalling cpumap_print_{list, cpumask}_to_buf(), to keep it unchanged\nduring the printing process."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T10:06:36.137Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/1c7818e2746e747838a3de1687e89eac7b947f08"
        },
        {
          "url": "https://git.kernel.org/stable/c/ca47e933a900492d89dcf5db18a99c28bd4a742d"
        },
        {
          "url": "https://git.kernel.org/stable/c/b02cf1d27e460ab2b3e1c8c9ce472d562cad2e8d"
        },
        {
          "url": "https://git.kernel.org/stable/c/360596e7fe319a5db1b5fb34a3952862ae53c924"
        },
        {
          "url": "https://git.kernel.org/stable/c/cbd399f78e23ad4492c174fc5e6b3676dba74a52"
        }
      ],
      "title": "topology: Keep the cpumask unchanged when printing cpumap",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-57917",
    "datePublished": "2025-01-19T11:52:37.866Z",
    "dateReserved": "2025-01-19T11:50:08.375Z",
    "dateUpdated": "2025-05-04T10:06:36.137Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-57917\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-01-19T12:15:25.860\",\"lastModified\":\"2025-01-23T17:15:20.330\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ntopology: Keep the cpumask unchanged when printing cpumap\\n\\nDuring fuzz testing, the following warning was discovered:\\n\\n different return values (15 and 11) from vsnprintf(\\\"%*pbl\\n \\\", ...)\\n\\n test:keyward is WARNING in kvasprintf\\n WARNING: CPU: 55 PID: 1168477 at lib/kasprintf.c:30 kvasprintf+0x121/0x130\\n Call Trace:\\n  kvasprintf+0x121/0x130\\n  kasprintf+0xa6/0xe0\\n  bitmap_print_to_buf+0x89/0x100\\n  core_siblings_list_read+0x7e/0xb0\\n  kernfs_file_read_iter+0x15b/0x270\\n  new_sync_read+0x153/0x260\\n  vfs_read+0x215/0x290\\n  ksys_read+0xb9/0x160\\n  do_syscall_64+0x56/0x100\\n  entry_SYSCALL_64_after_hwframe+0x78/0xe2\\n\\nThe call trace shows that kvasprintf() reported this warning during the\\nprinting of core_siblings_list. kvasprintf() has several steps:\\n\\n (1) First, calculate the length of the resulting formatted string.\\n\\n (2) Allocate a buffer based on the returned length.\\n\\n (3) Then, perform the actual string formatting.\\n\\n (4) Check whether the lengths of the formatted strings returned in\\n     steps (1) and (2) are consistent.\\n\\nIf the core_cpumask is modified between steps (1) and (3), the lengths\\nobtained in these two steps may not match. Indeed our test includes cpu\\nhotplugging, which should modify core_cpumask while printing.\\n\\nTo fix this issue, cache the cpumask into a temporary variable before\\ncalling cpumap_print_{list, cpumask}_to_buf(), to keep it unchanged\\nduring the printing process.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: topolog\u00eda: mantener la cpumask sin cambios al imprimir cpumap Durante las pruebas fuzz, se descubri\u00f3 la siguiente advertencia: diferentes valores de retorno (15 y 11) de vsnprintf(\\\"%*pbl \\\", ...) test:keyward es WARNING en kvasprintf WARNING: CPU: 55 PID: 1168477 en lib/kasprintf.c:30 kvasprintf+0x121/0x130 Seguimiento de llamadas: kvasprintf+0x121/0x130 kasprintf+0xa6/0xe0 bitmap_print_to_buf+0x89/0x100 core_siblings_list_read+0x7e/0xb0 kernfs_file_read_iter+0x15b/0x270 new_sync_read+0x153/0x260 vfs_read+0x215/0x290 ksys_read+0xb9/0x160 do_syscall_64+0x56/0x100 entry_SYSCALL_64_after_hwframe+0x78/0xe2 El seguimiento de la llamada muestra que kvasprintf() inform\u00f3 esta advertencia durante la impresi\u00f3n de core_siblings_list. kvasprintf() tiene varios pasos: (1) Primero, calcule la longitud de la cadena formateada resultante. (2) Asignar un b\u00fafer en funci\u00f3n de la longitud devuelta. (3) Luego, realice el formateo de la cadena real. (4) Verifique si las longitudes de las cadenas formateadas devueltas en los pasos (1) y (2) son consistentes. Si se modifica core_cpumask entre los pasos (1) y (3), las longitudes obtenidas en estos dos pasos pueden no coincidir. De hecho, nuestra prueba incluye la conexi\u00f3n en caliente de la CPU, que deber\u00eda modificar core_cpumask durante la impresi\u00f3n. Para solucionar este problema, almacene en cach\u00e9 cpumask en una variable temporal antes de llamar a cpumap_print_{list, cpumask}_to_buf(), para mantenerla sin cambios durante el proceso de impresi\u00f3n.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1c7818e2746e747838a3de1687e89eac7b947f08\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/360596e7fe319a5db1b5fb34a3952862ae53c924\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b02cf1d27e460ab2b3e1c8c9ce472d562cad2e8d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ca47e933a900492d89dcf5db18a99c28bd4a742d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cbd399f78e23ad4492c174fc5e6b3676dba74a52\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…