CVE-2024-47702
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
24/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Fail verification for sign-extension of packet data/data_end/data_meta<br />
<br />
syzbot reported a kernel crash due to<br />
commit 1f1e864b6555 ("bpf: Handle sign-extenstin ctx member accesses").<br />
The reason is due to sign-extension of 32-bit load for<br />
packet data/data_end/data_meta uapi field.<br />
<br />
The original code looks like:<br />
r2 = *(s32 *)(r1 + 76) /* load __sk_buff->data */<br />
r3 = *(u32 *)(r1 + 80) /* load __sk_buff->data_end */<br />
r0 = r2<br />
r0 += 8<br />
if r3 > r0 goto +1<br />
...<br />
Note that __sk_buff->data load has 32-bit sign extension.<br />
<br />
After verification and convert_ctx_accesses(), the final asm code looks like:<br />
r2 = *(u64 *)(r1 +208)<br />
r2 = (s32)r2<br />
r3 = *(u64 *)(r1 +80)<br />
r0 = r2<br />
r0 += 8<br />
if r3 > r0 goto pc+1<br />
...<br />
Note that &#39;r2 = (s32)r2&#39; may make the kernel __sk_buff->data address invalid<br />
which may cause runtime failure.<br />
<br />
Currently, in C code, typically we have<br />
void *data = (void *)(long)skb->data;<br />
void *data_end = (void *)(long)skb->data_end;<br />
...<br />
and it will generate<br />
r2 = *(u64 *)(r1 +208)<br />
r3 = *(u64 *)(r1 +80)<br />
r0 = r2<br />
r0 += 8<br />
if r3 > r0 goto pc+1<br />
<br />
If we allow sign-extension,<br />
void *data = (void *)(long)(int)skb->data;<br />
void *data_end = (void *)(long)skb->data_end;<br />
...<br />
the generated code looks like<br />
r2 = *(u64 *)(r1 +208)<br />
r2 = 32<br />
r3 = *(u64 *)(r1 +80)<br />
r0 = r2<br />
r0 += 8<br />
if r3 > r0 goto pc+1<br />
and this will cause verification failure since "r2
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6 (including) | 6.10.13 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page