漏洞信息
# EDAC/igen6:修复空指针引用漏洞
## 漏洞概述
在Linux内核中,发现并解决了EDAC/igen6模块中的空指针解引用漏洞。
## 影响版本
未指定具体影响版本。
## 细节
- **问题表现**: 内核崩溃,伴随以下内核日志:
```
EDAC igen6: Expected 2 mcs, but only 1 detected.
BUG: unable to handle page fault for address: 000000000000d570
...
Hardware name: Notebook V54x_6x_TU/V54x_6x_TU, BIOS Dasharo (coreboot+UEFI) v0.9.0 07/17/2024
RIP: e030:ecclog_handler+0x7e/0xf0 [igen6_edac]
...
igen6_probe+0x2a0/0x343 [igen6_edac]
...
igen6_init+0xc5/0xff0 [igen6_edac]
```
- **原因**: 一个内存控制器被BIOS禁用,但`igen6_edac`驱动仍然检查所有内存控制器(包括被禁用的),导致访问Null MMIO产生错误。
## 影响
- **漏洞影响**: 空指针解引用导致内核崩溃(kernel panic)。
- **修复措施**: 通过将配置结构恢复为非const类型,并更新`res_cfg->num_imc`字段来反映实际检测到的内存控制器数量。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
EDAC/igen6: Fix NULL pointer dereference
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved:
EDAC/igen6: Fix NULL pointer dereference
A kernel panic was reported with the following kernel log:
EDAC igen6: Expected 2 mcs, but only 1 detected.
BUG: unable to handle page fault for address: 000000000000d570
...
Hardware name: Notebook V54x_6x_TU/V54x_6x_TU, BIOS Dasharo (coreboot+UEFI) v0.9.0 07/17/2024
RIP: e030:ecclog_handler+0x7e/0xf0 [igen6_edac]
...
igen6_probe+0x2a0/0x343 [igen6_edac]
...
igen6_init+0xc5/0xff0 [igen6_edac]
...
This issue occurred because one memory controller was disabled by
the BIOS but the igen6_edac driver still checked all the memory
controllers, including this absent one, to identify the source of
the error. Accessing the null MMIO for the absent memory controller
resulted in the oops above.
Fix this issue by reverting the configuration structure to non-const
and updating the field 'res_cfg->num_imc' to reflect the number of
detected memory controllers.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Linux kernel 安全漏洞
漏洞描述信息
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于访问空指针,可能导致系统崩溃。
CVSS信息
N/A
漏洞类别
其他