CVE-2024-42063
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/07/2024
Last modified:
05/09/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode<br />
<br />
syzbot reported uninit memory usages during map_{lookup,delete}_elem.<br />
<br />
==========<br />
BUG: KMSAN: uninit-value in __dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]<br />
BUG: KMSAN: uninit-value in dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796<br />
__dev_map_lookup_elem kernel/bpf/devmap.c:441 [inline]<br />
dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796<br />
____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [inline]<br />
bpf_map_lookup_elem+0x5c/0x80 kernel/bpf/helpers.c:38<br />
___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997<br />
__bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237<br />
==========<br />
<br />
The reproducer should be in the interpreter mode.<br />
<br />
The C reproducer is trying to run the following bpf prog:<br />
<br />
0: (18) r0 = 0x0<br />
2: (18) r1 = map[id:49]<br />
4: (b7) r8 = 16777216<br />
5: (7b) *(u64 *)(r10 -8) = r8<br />
6: (bf) r2 = r10<br />
7: (07) r2 += -229<br />
^^^^^^^^^^<br />
<br />
8: (b7) r3 = 8<br />
9: (b7) r4 = 0<br />
10: (85) call dev_map_lookup_elem#1543472<br />
11: (95) exit<br />
<br />
It is due to the "void *key" (r2) passed to the helper. bpf allows uninit<br />
stack memory access for bpf prog with the right privileges. This patch<br />
uses kmsan_unpoison_memory() to mark the stack as initialized.<br />
<br />
This should address different syzbot reports on the uninit "void *key"<br />
argument during map_{lookup,delete}_elem.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.97 (excluding) | |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.37 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page