CVE-2024-50072

CVE Details

Release Date:2024-10-29

Description


In the Linux kernel, the following vulnerability has been resolved:\nx86/bugs: Use code segment selector for VERW operand\nRobert Gill reported below #GP in 32-bit mode when dosemu software was\nexecuting vm86() system call:\ngeneral protection fault: 0000 [#1] PREEMPT SMP\nCPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1\nHardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010\nEIP: restore_all_switch_stack+0xbe/0xcf\nEAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000\nESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc\nDS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046\nCR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0\nCall Trace:\nshow_regs+0x70/0x78\ndie_addr+0x29/0x70\nexc_general_protection+0x13c/0x348\nexc_bounds+0x98/0x98\nhandle_exception+0x14d/0x14d\nexc_bounds+0x98/0x98\nrestore_all_switch_stack+0xbe/0xcf\nexc_bounds+0x98/0x98\nrestore_all_switch_stack+0xbe/0xcf\nThis only happens in 32-bit mode when VERW based mitigations like MDS/RFDS\nare enabled. This is because segment registers with an arbitrary user value\ncan result in #GP when executing VERW. Intel SDM vol. 2C documents the\nfollowing behavior for VERW instruction:\n#GP(0) - If a memory operand effective address is outside the CS, DS, ES,\nFS, or GS segment limit.\nCLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user\nspace. Use %cs selector to reference VERW operand. This ensures VERW will\nnot #GP for an arbitrary user %ds.\n[ mingo: Fixed the SOB chain. ]

See more information about CVE-2024-50072 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v3 metrics

Base Score: 5.5
Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Attack Vector: Local
Attack Complexity: Low
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality: None
Integrity: None
Availability: High

Errata information


PlatformErrataRelease Date
Oracle Linux version 8 (kernel-uek)ELSA-2024-128872024-12-18
Oracle Linux version 9 (kernel-uek)ELSA-2024-128872024-12-18


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete