Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-39277
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-21 Jun, 2024 | 11:15
Updated At-04 May, 2025 | 09:16
Rejected At-
▼CVE Numbering Authority (CNA)
dma-mapping: benchmark: handle NUMA_NO_NODE correctly

In the Linux kernel, the following vulnerability has been resolved: dma-mapping: benchmark: handle NUMA_NO_NODE correctly cpumask_of_node() can be called for NUMA_NO_NODE inside do_map_benchmark() resulting in the following sanitizer report: UBSAN: array-index-out-of-bounds in ./arch/x86/include/asm/topology.h:72:28 index -1 is out of range for type 'cpumask [64][1]' CPU: 1 PID: 990 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #29 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) Call Trace: <TASK> dump_stack_lvl (lib/dump_stack.c:117) ubsan_epilogue (lib/ubsan.c:232) __ubsan_handle_out_of_bounds (lib/ubsan.c:429) cpumask_of_node (arch/x86/include/asm/topology.h:72) [inline] do_map_benchmark (kernel/dma/map_benchmark.c:104) map_benchmark_ioctl (kernel/dma/map_benchmark.c:246) full_proxy_unlocked_ioctl (fs/debugfs/file.c:333) __x64_sys_ioctl (fs/ioctl.c:890) do_syscall_64 (arch/x86/entry/common.c:83) entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) Use cpumask_of_node() in place when binding a kernel thread to a cpuset of a particular node. Note that the provided node id is checked inside map_benchmark_ioctl(). It's just a NUMA_NO_NODE case which is not handled properly later. Found by Linux Verification Center (linuxtesting.org).

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/dma/map_benchmark.c
Default Status
unaffected
Versions
Affected
  • From 65789daa8087e125927230ccb7e1eab13999b0cf before b41b0018e8ca06e985e87220a618ec633988fd13 (git)
  • From 65789daa8087e125927230ccb7e1eab13999b0cf before 8e1ba9df9a35e8dc64f657a64e523c79ba01e464 (git)
  • From 65789daa8087e125927230ccb7e1eab13999b0cf before 5a91116b003175302f2e6ad94b76fb9b5a141a41 (git)
  • From 65789daa8087e125927230ccb7e1eab13999b0cf before 50ee21bfc005e69f183d6b4b454e33f0c2571e1f (git)
  • From 65789daa8087e125927230ccb7e1eab13999b0cf before e64746e74f717961250a155e14c156616fcd981f (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/dma/map_benchmark.c
Default Status
affected
Versions
Affected
  • 5.11
Unaffected
  • From 0 before 5.11 (semver)
  • From 5.15.161 through 5.15.* (semver)
  • From 6.1.93 through 6.1.* (semver)
  • From 6.6.33 through 6.6.* (semver)
  • From 6.9.4 through 6.9.* (semver)
  • From 6.10 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b41b0018e8ca06e985e87220a618ec633988fd13
N/A
https://git.kernel.org/stable/c/8e1ba9df9a35e8dc64f657a64e523c79ba01e464
N/A
https://git.kernel.org/stable/c/5a91116b003175302f2e6ad94b76fb9b5a141a41
N/A
https://git.kernel.org/stable/c/50ee21bfc005e69f183d6b4b454e33f0c2571e1f
N/A
https://git.kernel.org/stable/c/e64746e74f717961250a155e14c156616fcd981f
N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:5.11:*:*:*:*:*:*:*
Default Status
affected
Versions
Affected
  • 5.11
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 65789daa8087 before b41b0018e8ca (git)
  • From 65789daa8087 before 8e1ba9df9a35 (git)
  • From 65789daa8087 before 5a91116b0031 (git)
  • From 65789daa8087 before 50ee21bfc005 (git)
  • From 65789daa8087 before e64746e74f71 (git)
Problem Types
TypeCWE IDDescription
CWECWE-125CWE-125 Out-of-bounds Read
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/b41b0018e8ca06e985e87220a618ec633988fd13
x_transferred
https://git.kernel.org/stable/c/8e1ba9df9a35e8dc64f657a64e523c79ba01e464
x_transferred
https://git.kernel.org/stable/c/5a91116b003175302f2e6ad94b76fb9b5a141a41
x_transferred
https://git.kernel.org/stable/c/50ee21bfc005e69f183d6b4b454e33f0c2571e1f
x_transferred
https://git.kernel.org/stable/c/e64746e74f717961250a155e14c156616fcd981f
x_transferred
Details not found