{"id":"CVE-2024-26712","summary":"powerpc/kasan: Fix addr error caused by page alignment","details":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kasan: Fix addr error caused by page alignment\n\nIn kasan_init_region, when k_start is not page aligned, at the begin of\nfor loop, k_cur = k_start & PAGE_MASK is less than k_start, and then\n`va = block + k_cur - k_start` is less than block, the addr va is invalid,\nbecause the memory address space from va to block is not alloced by\nmemblock_alloc, which will not be reserved by memblock_reserve later, it\nwill be used by other places.\n\nAs a result, memory overwriting occurs.\n\nfor example:\nint __init __weak kasan_init_region(void *start, size_t size)\n{\n[...]\n\t/* if say block(dcd97000) k_start(feef7400) k_end(feeff3fe) */\n\tblock = memblock_alloc(k_end - k_start, PAGE_SIZE);\n\t[...]\n\tfor (k_cur = k_start & PAGE_MASK; k_cur \u003c k_end; k_cur += PAGE_SIZE) {\n\t\t/* at the begin of for loop\n\t\t * block(dcd97000) va(dcd96c00) k_cur(feef7000) k_start(feef7400)\n\t\t * va(dcd96c00) is less than block(dcd97000), va is invalid\n\t\t */\n\t\tvoid *va = block + k_cur - k_start;\n\t\t[...]\n\t}\n[...]\n}\n\nTherefore, page alignment is performed on k_start before\nmemblock_alloc() to ensure the validity of the VA address.","modified":"2026-04-02T10:05:39.628164Z","published":"2024-04-03T14:55:14.149Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26712.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe"},{"type":"WEB","url":"https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058"},{"type":"WEB","url":"https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26712.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26712"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"663c0c9496a69f80011205ba3194049bcafd681d"},{"fixed":"230e89b5ad0a33f530a2a976b3e5e4385cb27882"},{"fixed":"2738e0aa2fb24a7ab9c878d912dc2b239738c6c6"},{"fixed":"0c09912dd8387e228afcc5e34ac5d79b1e3a1058"},{"fixed":"0516c06b19dc64807c10e01bb99b552bdf2d7dbe"},{"fixed":"70ef2ba1f4286b2b73675aeb424b590c92d57b25"},{"fixed":"4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"5ce93076d8ee2a0fac3ad4adbd2e91b6197146db"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26712.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}