ghsa-vrg6-343w-wxr6
Vulnerability from github
Published
2024-02-27 21:31
Modified
2024-04-10 21:30
Details

In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/cpufreq_cooling: Fix slab OOB issue

Slab OOB issue is scanned by KASAN in cpu_power_to_freq(). If power is limited below the power of OPP0 in EM table, it will cause slab out-of-bound issue with negative array index.

Return the lowest frequency if limited power cannot found a suitable OPP in EM table to fix this issue.

Backtrace: [] die+0x104/0x5ac [] bug_handler+0x64/0xd0 [] brk_handler+0x160/0x258 [] do_debug_exception+0x248/0x3f0 [] el1_dbg+0x14/0xbc [] __kasan_report+0x1dc/0x1e0 [] kasan_report+0x10/0x20 [] __asan_report_load8_noabort+0x18/0x28 [] cpufreq_power2state+0x180/0x43c [] power_actor_set_power+0x114/0x1d4 [] allocate_power+0xaec/0xde0 [] power_allocator_throttle+0x3ec/0x5a4 [] handle_thermal_trip+0x160/0x294 [] thermal_zone_device_check+0xe4/0x154 [] process_one_work+0x5e4/0xe28 [] worker_thread+0xa4c/0xfac [] kthread+0x33c/0x358 [] ret_from_fork+0xc/0x18

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2020-36776"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-129"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-02-27T19:04:05Z",
    "severity": "MODERATE"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nthermal/drivers/cpufreq_cooling: Fix slab OOB issue\n\nSlab OOB issue is scanned by KASAN in cpu_power_to_freq().\nIf power is limited below the power of OPP0 in EM table,\nit will cause slab out-of-bound issue with negative array\nindex.\n\nReturn the lowest frequency if limited power cannot found\na suitable OPP in EM table to fix this issue.\n\nBacktrace:\n[\u003cffffffd02d2a37f0\u003e] die+0x104/0x5ac\n[\u003cffffffd02d2a5630\u003e] bug_handler+0x64/0xd0\n[\u003cffffffd02d288ce4\u003e] brk_handler+0x160/0x258\n[\u003cffffffd02d281e5c\u003e] do_debug_exception+0x248/0x3f0\n[\u003cffffffd02d284488\u003e] el1_dbg+0x14/0xbc\n[\u003cffffffd02d75d1d4\u003e] __kasan_report+0x1dc/0x1e0\n[\u003cffffffd02d75c2e0\u003e] kasan_report+0x10/0x20\n[\u003cffffffd02d75def8\u003e] __asan_report_load8_noabort+0x18/0x28\n[\u003cffffffd02e6fce5c\u003e] cpufreq_power2state+0x180/0x43c\n[\u003cffffffd02e6ead80\u003e] power_actor_set_power+0x114/0x1d4\n[\u003cffffffd02e6fac24\u003e] allocate_power+0xaec/0xde0\n[\u003cffffffd02e6f9f80\u003e] power_allocator_throttle+0x3ec/0x5a4\n[\u003cffffffd02e6ea888\u003e] handle_thermal_trip+0x160/0x294\n[\u003cffffffd02e6edd08\u003e] thermal_zone_device_check+0xe4/0x154\n[\u003cffffffd02d351cb4\u003e] process_one_work+0x5e4/0xe28\n[\u003cffffffd02d352f44\u003e] worker_thread+0xa4c/0xfac\n[\u003cffffffd02d360124\u003e] kthread+0x33c/0x358\n[\u003cffffffd02d289940\u003e] ret_from_fork+0xc/0x18",
  "id": "GHSA-vrg6-343w-wxr6",
  "modified": "2024-04-10T21:30:28Z",
  "published": "2024-02-27T21:31:26Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36776"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/34ab17cc6c2c1ac93d7e5d53bb972df9a968f085"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/6bf443acf6ca4f666d0e4225614ba9993a3aa1a9"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/876a5f33e5d961d879c5436987c09b3d9ef70379"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c24a20912eef00587416628149c438e885eb1304"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.