Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-25221: git/torvalds/linux.git - Linux kernel source tree

get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.

CVE
#google#linux#git#intel

The existing code accepted process_vm_readv() success or failure as long as it didn’t return garbage. This is too weak: if the vsyscall page is readable, then process_vm_readv() should succeed and, if the page is not readable, then it should fail. Signed-off-by: Andy Lutomirski [email protected] Signed-off-by: Dave Hansen [email protected] Cc: [email protected] Cc: Peter Zijlstra [email protected] Cc: Andy Lutomirski [email protected] Cc: Jann Horn [email protected] Cc: John Hubbard [email protected] Cc: Andrew Morton [email protected] Cc: Kirill A. Shutemov [email protected] Signed-off-by: Linus Torvalds [email protected]

@@ -462,6 +462,17 @@ static int test_vsys_x(void)

return 0;

}

+/*

+ * Debuggers expect ptrace() to be able to peek at the vsyscall page.

+ * Use process_vm_readv() as a proxy for ptrace() to test this. We

+ * want it to work in the vsyscall=emulate case and to fail in the

+ * vsyscall=xonly case.

+ *

+ * It’s worth noting that this ABI is a bit nutty. write(2) can’t

+ * read from the vsyscall page on any kernel version or mode. The

+ * fact that ptrace() ever worked was a nice courtesy of old kernels,

+ * but the code to support it is fairly gross.

+ */

static int test_process_vm_readv(void)

{

#ifdef __x86_64__

@@ -477,8 +488,12 @@ static int test_process_vm_readv(void)

remote.iov_len = 4096;

ret = process_vm_readv(getpid(), &local, 1, &remote, 1, 0);

if (ret != 4096) {

- printf("[OK]\tprocess_vm_readv() failed (ret = %d, errno = %d)\n", ret, errno);

- return 0;

+ /*

+ * We expect process_vm_readv() to work if and only if the

+ * vsyscall page is readable.

+ */

+ printf("[%s]\tprocess_vm_readv() failed (ret = %d, errno = %d)\n", vsyscall_map_r ? “FAIL” : "OK", ret, errno);

+ return vsyscall_map_r ? 1 : 0;

}

if (vsyscall_map_r) {

@@ -488,6 +503,9 @@ static int test_process_vm_readv(void)

printf("[FAIL]\tIt worked but returned incorrect data\n");

return 1;

}

+ } else {

+ printf("[FAIL]\tprocess_rm_readv() succeeded, but it should have failed in this configuration\n");

+ return 1;

}

#endif

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907