mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
112 lines
5.3 KiB
JSON
112 lines
5.3 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-26710",
|
|
"ASSIGNER": "cve@kernel.org",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kasan: Limit KASAN thread size increase to 32KB\n\nKASAN is seen to increase stack usage, to the point that it was reported\nto lead to stack overflow on some 32-bit machines (see link).\n\nTo avoid overflows the stack size was doubled for KASAN builds in\ncommit 3e8635fb2e07 (\"powerpc/kasan: Force thread size increase with\nKASAN\").\n\nHowever with a 32KB stack size to begin with, the doubling leads to a\n64KB stack, which causes build errors:\n arch/powerpc/kernel/switch.S:249: Error: operand out of range (0x000000000000fe50 is not between 0xffffffffffff8000 and 0x0000000000007fff)\n\nAlthough the asm could be reworked, in practice a 32KB stack seems\nsufficient even for KASAN builds - the additional usage seems to be in\nthe 2-3KB range for a 64-bit KASAN build.\n\nSo only increase the stack for KASAN if the stack size is < 32KB."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Linux",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Linux",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "9ccf64e763ac",
|
|
"version_value": "4297217bcf1f"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "b38014874530",
|
|
"version_value": "4cc31fa07445"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "58f396513cb1",
|
|
"version_value": "b29b16bd836a"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "18f14afe2816",
|
|
"version_value": "f1acb109505d"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.1.75",
|
|
"version_value": "6.1.79"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.6.14",
|
|
"version_value": "6.6.18"
|
|
},
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.7.2",
|
|
"version_value": "6.7.6"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/4297217bcf1f0948a19c2bacc6b68d92e7778ad9",
|
|
"refsource": "MISC",
|
|
"name": "https://git.kernel.org/stable/c/4297217bcf1f0948a19c2bacc6b68d92e7778ad9"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb",
|
|
"refsource": "MISC",
|
|
"name": "https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/b29b16bd836a838b7690f80e37f8376414c74cbe",
|
|
"refsource": "MISC",
|
|
"name": "https://git.kernel.org/stable/c/b29b16bd836a838b7690f80e37f8376414c74cbe"
|
|
},
|
|
{
|
|
"url": "https://git.kernel.org/stable/c/f1acb109505d983779bbb7e20a1ee6244d2b5736",
|
|
"refsource": "MISC",
|
|
"name": "https://git.kernel.org/stable/c/f1acb109505d983779bbb7e20a1ee6244d2b5736"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "bippy-9e1c9544281a"
|
|
}
|
|
} |