blob: cea6bfc65bee9fe1c1fa90c2710edaaad9d3d494 [file] [log] [blame]
From bippy-5f407fcff5a0 Mon Sep 17 00:00:00 2001
From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: <linux-cve-announce@vger.kernel.org>
Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org>
Subject: CVE-2024-35983: bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS
bits_per() rounds up to the next power of two when passed a power of
two. This causes crashes on some machines and configurations.
The Linux kernel CVE team has assigned CVE-2024-35983 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.4.274 with commit d6077e0d38b4953c863d0db4a5b3f41d21e0d546 and fixed in 5.4.275 with commit d34a516f2635090d36a306f84573e8de3d7374ce
Issue introduced in 5.10.215 with commit 83a2275f9d3230c761014b1467888b1ef469be74 and fixed in 5.10.216 with commit 66297b2ceda841f809637731d287bda3a93b49d8
Issue introduced in 5.15.154 with commit d2a7a81088c6abe778b0a93a7eeb79487a943818 and fixed in 5.15.158 with commit 93ba36238db6a74a82feb3dc476e25ea424ad630
Issue introduced in 6.1.84 with commit 428ca0000f0abd5c99354c52a36becf2b815ca21 and fixed in 6.1.90 with commit 9b7c5004d7c5ae062134052a85290869a015814c
Issue introduced in 6.6.24 with commit b46c822f8b555b9513df44047b0e72c06720df62 and fixed in 6.6.30 with commit 15aa09d6d84629eb5296de30ac0aa19a33512f16
Issue introduced in 6.8.3 with commit cf778fff03be1ee88c49b72959650147573c3301 and fixed in 6.8.9 with commit ebfe41889b762f1933c6762f6624b9724a25bee0
Issue introduced in 6.7.12 with commit b2e1b090a590d41abe647eadb6bf2a5dc47b63ab
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2024-35983
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
kernel/bounds.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce
https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8
https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630
https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c
https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16
https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0
https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79