In the Linux kernel, the following vulnerability has been resolved:
riscv: prevent pt_regs corruption for secondary idle threads
Top of the kernel thread stack should be reserved for pt_regs. However
this is not the case for the idle threads of the secondary boot harts.
Their stacks overlap with their pt_regs, so both may get corrupted.
Similar issue has been fixed for the primary hart, see c7cdd96eca28
("riscv: prevent stack corruption by reserving task_pt_regs(p) early").
However that fix was not propagated to the secondary harts. The problem
has been noticed in some CPU hotplug tests with V enabled. The function
smp_callin stored several registers on stack, corrupting top of pt_regs
structure including status field. As a result, kernel attempted to save
or restore inexistent V context.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 | Mailing List Patch |
https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 | Mailing List Patch |
https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af | Mailing List Patch |
https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-06-24 14:15
Updated : 2024-06-26 13:53
NVD link : CVE-2024-38667
Mitre link : CVE-2024-38667
CVE.ORG link : CVE-2024-38667
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write