CVE-2024-41065

In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Whitelist dtl slub object for copying to userspace Reading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-* results in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as shown below. kernel BUG at mm/usercopy.c:102! Oops: Exception in kernel mode, sig: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85 Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries NIP: c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8 REGS: c000000120c078c0 TRAP: 0700 Not tainted (6.10.0-rc3) MSR: 8000000000029033 <SF,EE,ME,IR,DR,RI,LE> CR: 2828220f XER: 0000000e CFAR: c0000000001fdc80 IRQMASK: 0 [ ... GPRs omitted ... ] NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0 LR [c0000000005d23d0] usercopy_abort+0x74/0xb0 Call Trace: usercopy_abort+0x74/0xb0 (unreliable) __check_heap_object+0xf8/0x120 check_heap_object+0x218/0x240 __check_object_size+0x84/0x1a4 dtl_file_read+0x17c/0x2c4 full_proxy_read+0x8c/0x110 vfs_read+0xdc/0x3a0 ksys_read+0x84/0x144 system_call_exception+0x124/0x330 system_call_vectored_common+0x15c/0x2ec --- interrupt: 3000 at 0x7fff81f3ab34 Commit 6d07d1cd300f ("usercopy: Restrict non-usercopy caches to size 0") requires that only whitelisted areas in slab/slub objects can be copied to userspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY. Dtl contains hypervisor dispatch events which are expected to be read by privileged users. Hence mark this safe for user access. Specify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the entire object.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*

History

09 Oct 2025, 18:06

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4 - () https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4 - Patch
References () https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586 - () https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586 - Patch
References () https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2 - () https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2 - Patch
References () https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd - () https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd - Patch
References () https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6 - () https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6 - Patch
References () https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a - () https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a - Patch
References () https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f - () https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
CWE NVD-CWE-noinfo

21 Nov 2024, 09:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/pseries: incluir en la lista blanca el objeto dtl slub para copiarlo en el espacio de usuario. La lectura del registro de seguimiento de envío desde /sys/kernel/debug/powerpc/dtl/cpu-* da como resultado un ERROR() cuando la configuración CONFIG_HARDENED_USERCOPY está habilitada como se muestra a continuación. ¡ERROR del kernel en mm/usercopy.c:102! Vaya: Excepción en modo kernel, sign: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries Módulos vinculados en: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror _region_hash dm_log dm_mod fusible CPU: 27 PID: 1815 Comm: python3 No contaminado 6.10.0-rc3 #85 Nombre de hardware: IBM,9040-MRX POWER10 (sin procesar) 0x800200 0xf000006 de:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries NIP: c0000000005d23d4 LR: c0000000005d23d0 CTR : 00000000006ee6f8 REGS: c000000120c078c0 TRAP: 0700 No contaminado (6.10.0-rc3) MSR: 8000000000029033 CR: 2828220f XER: 0000000e CFAR: 00000001fdc80 MÁSCARA IRQ: 0 [ .. GPR omitidos... ] NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0 LR [c0000000005d23d0] usercopy_abort+0x74/0xb0 Seguimiento de llamadas: usercopy_abort+0x74/0xb0 (no confiable) __check_heap_object+0xf8/0x 120 check_heap_object+0x218/0x240 __check_object_size+0x84/ 0x1a4 dtl_file_read+0x17c/0x2c4 full_proxy_read+0x8c/0x110 vfs_read+0xdc/0x3a0 ksys_read+0x84/0x144 system_call_exception+0x124/0x330 system_call_vectored_common+0x15c/0x2ec --- interrupción: 3000 0x7fff81f3ab34 Confirmación 6d07d1cd300f ("copia de usuario: restringir cachés que no sean de copia de usuario) a tamaño 0") requiere que solo las áreas incluidas en la lista blanca en objetos de losa/slub se puedan copiar al espacio de usuario cuando el refuerzo de copia de usuario está habilitado usando CONFIG_HARDENED_USERCOPY. Dtl contiene eventos de envío del hipervisor que se espera que sean leídos por usuarios privilegiados. Por lo tanto, marque esto como seguro para el acceso de los usuarios. Especifique useroffset=0 y usersize=DISPATCH_LOG_BYTES para incluir todo el objeto en la lista blanca.
References () https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4 - () https://git.kernel.org/stable/c/0f5892212c27be31792ef1daa89c8dac1b3047e4 -
References () https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586 - () https://git.kernel.org/stable/c/1a14150e1656f7a332a943154fc486504db4d586 -
References () https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2 - () https://git.kernel.org/stable/c/1ee68686d1e2a5da35d5650be0be1ce06fe2ceb2 -
References () https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd - () https://git.kernel.org/stable/c/6b16098148ea58a67430d90e20476be2377c3acd -
References () https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6 - () https://git.kernel.org/stable/c/a7b952941ce07e1e7a2cafd08c64a98e14f553e6 -
References () https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a - () https://git.kernel.org/stable/c/e512a59b472684d8585125101ab03b86c2c1348a -
References () https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f - () https://git.kernel.org/stable/c/e59822f9d700349cd17968d22c979db23a2d347f -

29 Jul 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 15:15

Updated : 2025-10-09 18:06


NVD link : CVE-2024-41065

Mitre link : CVE-2024-41065

CVE.ORG link : CVE-2024-41065


JSON object : View

Products Affected

linux

  • linux_kernel