In the Linux kernel, the following vulnerability has been resolved:
regmap: maple: Fix cache corruption in regcache_maple_drop()
When keeping the upper end of a cache block entry, the entry[] array
must be indexed by the offset from the base register of the block,
i.e. max - mas.index.
The code was indexing entry[] by only the register address, leading
to an out-of-bounds access that copied some part of the kernel
memory over the cache contents.
This bug was not detected by the regmap KUnit test because it only
tests with a block of registers starting at 0, so mas.index == 0.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2024-12-19T09:00:38.523Z
Reserved: 2024-05-17T13:50:33.157Z
Link: CVE-2024-36019

Updated: 2024-08-02T03:30:12.601Z

Status : Awaiting Analysis
Published: 2024-05-30T15:15:49.027
Modified: 2024-11-21T09:21:26.973
Link: CVE-2024-36019
