In the Linux kernel, the following vulnerability has been resolved:
riscv: prevent pt_regs corruption for secondary idle threads
Top of the kernel thread stack should be reserved for pt_regs. However
this is not the case for the idle threads of the secondary boot harts.
Their stacks overlap with their pt_regs, so both may get corrupted.
Similar issue has been fixed for the primary hart, see c7cdd96eca28
("riscv: prevent stack corruption by reserving task_pt_regs(p) early").
However that fix was not propagated to the secondary harts. The problem
has been noticed in some CPU hotplug tests with V enabled. The function
smp_callin stored several registers on stack, corrupting top of pt_regs
structure including status field. As a result, kernel attempted to save
or restore inexistent V context.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 | Mailing List Patch |
https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 | Mailing List Patch |
https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af | Mailing List Patch |
https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e | Mailing List Patch |
https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 | Mailing List Patch |
https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 | Mailing List Patch |
https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af | Mailing List Patch |
https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e - Mailing List, Patch |
26 Jun 2024, 13:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e - Mailing List, Patch | |
CWE | CWE-787 |
24 Jun 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-24 14:15
Updated : 2024-11-21 09:26
NVD link : CVE-2024-38667
Mitre link : CVE-2024-38667
CVE.ORG link : CVE-2024-38667
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write