CVE-2024-26901
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/04/2024
Last modified:
07/11/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak<br />
<br />
syzbot identified a kernel information leak vulnerability in<br />
do_sys_name_to_handle() and issued the following report [1].<br />
<br />
[1]<br />
"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]<br />
BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40<br />
instrument_copy_to_user include/linux/instrumented.h:114 [inline]<br />
_copy_to_user+0xbc/0x100 lib/usercopy.c:40<br />
copy_to_user include/linux/uaccess.h:191 [inline]<br />
do_sys_name_to_handle fs/fhandle.c:73 [inline]<br />
__do_sys_name_to_handle_at fs/fhandle.c:112 [inline]<br />
__se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94<br />
__x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94<br />
...<br />
<br />
Uninit was created at:<br />
slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768<br />
slab_alloc_node mm/slub.c:3478 [inline]<br />
__kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517<br />
__do_kmalloc_node mm/slab_common.c:1006 [inline]<br />
__kmalloc+0x121/0x3c0 mm/slab_common.c:1020<br />
kmalloc include/linux/slab.h:604 [inline]<br />
do_sys_name_to_handle fs/fhandle.c:39 [inline]<br />
__do_sys_name_to_handle_at fs/fhandle.c:112 [inline]<br />
__se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94<br />
__x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94<br />
...<br />
<br />
Bytes 18-19 of 20 are uninitialized<br />
Memory access of size 20 starts at ffff888128a46380<br />
Data copied to user address 0000000020000240"<br />
<br />
Per Chuck Lever&#39;s suggestion, use kzalloc() instead of kmalloc() to<br />
solve the problem.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.39 (including) | 4.19.311 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.273 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.214 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.153 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.83 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.23 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/3948abaa4e2be938ccdfc289385a27342fb13d43
- https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71
- https://git.kernel.org/stable/c/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1
- https://git.kernel.org/stable/c/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b
- https://git.kernel.org/stable/c/bf9ec1b24ab4e94345aa1c60811dd329f069c38b
- https://git.kernel.org/stable/c/c1362eae861db28b1608b9dc23e49634fe87b63b
- https://git.kernel.org/stable/c/cba138f1ef37ec6f961baeab62f312dedc7cf730
- https://git.kernel.org/stable/c/cde76b3af247f615447bcfecf610bb76c3529126
- https://git.kernel.org/stable/c/e6450d5e46a737a008b4885aa223486113bf0ad6



