Lucene search

K
cve416baaa9-dc9f-4396-8d5f-8c081fb06d67CVE-2024-35871
HistoryMay 19, 2024 - 9:15 a.m.

CVE-2024-35871

2024-05-1909:15:08
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
27
linux kernel
riscv
vulnerability fix
kernel gp leakage
user mode
syscall execution

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.3%

In the Linux kernel, the following vulnerability has been resolved:

riscv: process: Fix kernel gp leakage

childregs represents the registers which are active for the new thread
in user context. For a kernel thread, childregs->gp is never used since
the kernel gp is not touched by switch_to. For a user mode helper, the
gp value can be observed in user space after execve or possibly by other
means.

[From the email thread]

The /* Kernel thread */ comment is somewhat inaccurate in that it is also used
for user_mode_helper threads, which exec a user process, e.g. /sbin/init or
when /proc/sys/kernel/core_pattern is a pipe. Such threads do not have
PF_KTHREAD set and are valid targets for ptrace etc. even before they exec.

childregs is the user context during syscall execution and it is observable
from userspace in at least five ways:

  1. kernel_execve does not currently clear integer registers, so the starting
    register state for PID 1 and other user processes started by the kernel has
    sp = user stack, gp = kernel __global_pointer$, all other integer registers
    zeroed by the memset in the patch comment.

    This is a bug in its own right, but I’m unwilling to bet that it is the only
    way to exploit the issue addressed by this patch.

  2. ptrace(PTRACE_GETREGSET): you can PTRACE_ATTACH to a user_mode_helper thread
    before it execs, but ptrace requires SIGSTOP to be delivered which can only
    happen at user/kernel boundaries.

  3. /proc//task//syscall: this is perfectly happy to read pt_regs for
    user_mode_helpers before the exec completes, but gp is not one of the
    registers it returns.

  4. PERF_SAMPLE_REGS_USER: LOCKDOWN_PERF normally prevents access to kernel
    addresses via PERF_SAMPLE_REGS_INTR, but due to this bug kernel addresses
    are also exposed via PERF_SAMPLE_REGS_USER which is permitted under
    LOCKDOWN_PERF. I have not attempted to write exploit code.

  5. Much of the tracing infrastructure allows access to user registers. I have
    not attempted to determine which forms of tracing allow access to user
    registers without already allowing access to kernel registers.

Affected configurations

Vulners
Node
linuxlinux_kernelRange4.155.10.216
OR
linuxlinux_kernelRange5.11.05.15.154
OR
linuxlinux_kernelRange5.16.06.1.85
OR
linuxlinux_kernelRange6.2.06.6.26
OR
linuxlinux_kernelRange6.7.06.8.5
OR
linuxlinux_kernelRange6.9.0

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "arch/riscv/kernel/process.c"
    ],
    "versions": [
      {
        "version": "7db91e57a0ac",
        "lessThan": "9abc3e6f1116",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "7db91e57a0ac",
        "lessThan": "dff6072124f6",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "7db91e57a0ac",
        "lessThan": "f6583444d7e7",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "7db91e57a0ac",
        "lessThan": "00effef72c98",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "7db91e57a0ac",
        "lessThan": "d8dcba0691b8",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "7db91e57a0ac",
        "lessThan": "d14fa1fcf69d",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "arch/riscv/kernel/process.c"
    ],
    "versions": [
      {
        "version": "4.15",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.15",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.216",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.154",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.85",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.26",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8.5",
        "lessThanOrEqual": "6.8.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.3%