CVE-2023-52504

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
02/03/2024
Last modified:
11/12/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> x86/alternatives: Disable KASAN in apply_alternatives()<br /> <br /> Fei has reported that KASAN triggers during apply_alternatives() on<br /> a 5-level paging machine:<br /> <br /> BUG: KASAN: out-of-bounds in rcu_is_watching()<br /> Read of size 4 at addr ff110003ee6419a0 by task swapper/0/0<br /> ...<br /> __asan_load4()<br /> rcu_is_watching()<br /> trace_hardirqs_on()<br /> text_poke_early()<br /> apply_alternatives()<br /> ...<br /> <br /> On machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57)<br /> gets patched. It includes KASAN code, where KASAN_SHADOW_START depends on<br /> __VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled().<br /> <br /> KASAN gets confused when apply_alternatives() patches the<br /> KASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START<br /> static, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue.<br /> <br /> Fix it for real by disabling KASAN while the kernel is patching alternatives.<br /> <br /> [ mingo: updated the changelog ]

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.17 (including) 4.19.297 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.270 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.199 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.136 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.59 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.5.8 (excluding)
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*