Release Date: | 2024-10-29 |
In the Linux kernel, the following vulnerability has been resolved:\nx86/bugs: Use code segment selector for VERW operand\nRobert Gill reported below #GP in 32-bit mode when dosemu software was\nexecuting vm86() system call:\ngeneral protection fault: 0000 [#1] PREEMPT SMP\nCPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1\nHardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010\nEIP: restore_all_switch_stack+0xbe/0xcf\nEAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000\nESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc\nDS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046\nCR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0\nCall Trace:\nshow_regs+0x70/0x78\ndie_addr+0x29/0x70\nexc_general_protection+0x13c/0x348\nexc_bounds+0x98/0x98\nhandle_exception+0x14d/0x14d\nexc_bounds+0x98/0x98\nrestore_all_switch_stack+0xbe/0xcf\nexc_bounds+0x98/0x98\nrestore_all_switch_stack+0xbe/0xcf\nThis only happens in 32-bit mode when VERW based mitigations like MDS/RFDS\nare enabled. This is because segment registers with an arbitrary user value\ncan result in #GP when executing VERW. Intel SDM vol. 2C documents the\nfollowing behavior for VERW instruction:\n#GP(0) - If a memory operand effective address is outside the CS, DS, ES,\nFS, or GS segment limit.\nCLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user\nspace. Use %cs selector to reference VERW operand. This ensures VERW will\nnot #GP for an arbitrary user %ds.\n[ mingo: Fixed the SOB chain. ]
See more information about CVE-2024-50072 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS metrics and score provided are preliminary and subject to review.
Base Score: | 5.5 |
Vector String: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Version: | 3.1 |
Attack Vector: | Local |
Attack Complexity: | Low |
Privileges Required: | Low |
User Interaction: | None |
Scope: | Unchanged |
Confidentiality: | None |
Integrity: | None |
Availability: | High |
Platform | Errata | Release Date |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12887 | 2024-12-18 |
Oracle Linux version 9 (kernel-uek) | ELSA-2024-12887 | 2024-12-18 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: