Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26603
HistoryFeb 26, 2024 - 12:00 a.m.

CVE-2024-26603

2024-02-2600:00:00
ubuntu.com
ubuntu.com
19
linux
kernel
vulnerability
cve-2024-26603
xsave buffer
x86
fpu
userspace
xrstor
fault

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.4

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:
x86/fpu: Stop relying on userspace for info to fault in xsave buffer Before
this change, the expected size of the user space buffer was taken from
fx_sw->xstate_size. fx_sw->xstate_size can be changed from user-space, so
it is possible construct a sigreturn frame where: * fx_sw->xstate_size is
smaller than the size required by valid bits in fx_sw->xfeatures. *
user-space unmaps parts of the sigrame fpu buffer so that not all of the
buffer required by xrstor is accessible. In this case, xrstor tries to
restore and accesses the unmapped area which results in a fault. But
fault_in_readable succeeds because buf + fx_sw->xstate_size is within the
still mapped area, so it goes back and tries xrstor again. It will spin in
this loop forever. Instead, fault in the maximum size which can be touched
by XRSTOR (taken from fpstate->user_size). [ dhansen: tweak subject /
changelog ]

Rows per page:
1-10 of 391

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

5.4

Confidence

High

EPSS

0

Percentile

5.1%