vulnerability
Ubuntu: (Multiple Advisories) (CVE-2024-57934): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:L/AC:M/Au:S/C:N/I:N/A:C) | 2025-01-21 | 2025-03-28 | 2025-04-02 |
Description
In the Linux kernel, the following vulnerability has been resolved:
fgraph: Add READ_ONCE() when accessing fgraph_array[]
In __ftrace_return_to_handler(), a loop iterates over the fgraph_array[]
elements, which are fgraph_ops. The loop checks if an element is a
fgraph_stub to prevent using a fgraph_stub afterward.
However, if the compiler reloads fgraph_array[] after this check, it might
race with an update to fgraph_array[] that introduces a fgraph_stub. This
could result in the stub being processed, but the stub contains a null
"func_hash" field, leading to a NULL pointer dereference.
To ensure that the gops compared against the fgraph_stub matches the gops
processed later, add a READ_ONCE(). A similar patch appears in commit
63a8dfb ("function_graph: Add READ_ONCE() when accessing fgraph_array[]").
Solution(s)
References
- CVE-2024-57934
- https://attackerkb.com/topics/CVE-2024-57934
- UBUNTU-USN-7379-1
- UBUNTU-USN-7379-2
- UBUNTU-USN-7380-1
- UBUNTU-USN-7381-1
- UBUNTU-USN-7382-1
- URL-https://git.kernel.org/linus/d65474033740ded0a4fe9a097fce72328655b41d
- URL-https://git.kernel.org/stable/c/b68b2a3fbacc7be720ef589d489bcacdd05c6d38
- URL-https://git.kernel.org/stable/c/d65474033740ded0a4fe9a097fce72328655b41d
- URL-https://ubuntu.com/security/notices/USN-7379-1
- URL-https://ubuntu.com/security/notices/USN-7380-1
- URL-https://ubuntu.com/security/notices/USN-7381-1
- URL-https://ubuntu.com/security/notices/USN-7382-1
- URL-https://www.cve.org/CVERecord?id=CVE-2024-57934

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.