CVE-2024-27406
lib/Kconfig.debug: TEST_IOV_ITER depends on MMU
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: lib/Kconfig.debug: TEST_IOV_ITER depends on MMU Trying to run the iov_iter unit test on a nommu system such as the qemu
kc705-nommu emulation results in a crash. KTAP version 1 # Subtest: iov_iter # module: kunit_iov_iter 1..9
BUG: failure at mm/nommu.c:318/vmap()!
Kernel panic - not syncing: BUG! The test calls vmap() directly, but vmap() is not supported on nommu
systems, causing the crash. TEST_IOV_ITER therefore needs to depend on
MMU.
En el kernel de Linux, se resolvió la siguiente vulnerabilidad: lib/Kconfig.debug: TEST_IOV_ITER depende de MMU Intentar ejecutar la prueba unitaria iov_iter en un sistema nommu como la emulación qemu kc705-nommu produce un bloqueo. KTAP versión 1 # Subprueba: iov_iter # módulo: kunit_iov_iter 1..9 BUG: fallo en mm/nommu.c:318/vmap()! Pánico del kernel: no se sincroniza: ¡BUG! La prueba llama a vmap() directamente, pero vmap() no es compatible con los sistemas nommu, lo que provoca el bloqueo. Por lo tanto, TEST_IOV_ITER debe depender de MMU.
In the Linux kernel, the following vulnerability has been resolved: lib/Kconfig.debug: TEST_IOV_ITER depends on MMU Trying to run the iov_iter unit test on a nommu system such as the qemu kc705-nommu emulation results in a crash. KTAP version 1 # Subtest: iov_iter # module: kunit_iov_iter 1..9 BUG: failure at mm/nommu.c:318/vmap()! Kernel panic - not syncing: BUG! The test calls vmap() directly, but vmap() is not supported on nommu systems, causing the crash. TEST_IOV_ITER therefore needs to depend on MMU.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-02-25 CVE Reserved
- 2024-05-17 CVE Published
- 2025-05-04 CVE Updated
- 2025-06-27 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/2d71340ff1d41a5b9fc1b30ded12d638b2e2ae96 | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 6.6.19 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 6.6.19" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 6.7.7 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 6.7.7" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.6 < 6.8 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.6 < 6.8" | en |
Affected
|