跳转到帖子

Amazon Linux AMI 2: CVE-2023-52635: Security patch for kernel (ALASKERNEL-5.10-2024-053)

recommended_posts

发布于
  • Members

Amazon Linux AMI 2: CVE-2023-52635: Security patch for kernel (ALASKERNEL-5.10-2024-053)

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/02/2024
Created
08/29/2024
Added
08/28/2024
Modified
08/28/2024

Description

In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: Synchronize devfreq_monitor_[start/stop] There is a chance if a frequent switch of the governor done in a loop result in timer list corruption where timer cancel being done from two place one from cancel_delayed_work_sync() and followed by expire_timers() can be seen from the traces[1]. while true do echo "simple_ondemand" > /sys/class/devfreq/1d84000.ufshc/governor echo "performance" > /sys/class/devfreq/1d84000.ufshc/governor done It looks to be issue with devfreq driver where device_monitor_[start/stop] need to synchronized so that delayed work should get corrupted while it is either being queued or running or being cancelled. Let's use polling flag and devfreq lock to synchronize the queueing the timer instance twice and work data being corrupted. [1] ... .. <idle>-0[003] 9436.209662:timer_cancel timer=0xffffff80444f0428 <idle>-0[003] 9436.209664:timer_expire_entry timer=0xffffff80444f0428now=0x10022da1cfunction=__typeid__ZTSFvP10timer_listE_global_addrbaseclk=0x10022da1c <idle>-0[003] 9436.209718:timer_expire_exit timer=0xffffff80444f0428 kworker/u16:6-14217[003] 9436.209863:timer_start timer=0xffffff80444f0428function=__typeid__ZTSFvP10timer_listE_global_addrexpires=0x10022da2bnow=0x10022da1cflags=182452227 vendor.xxxyyy.ha-1593[004] 9436.209888:timer_cancel timer=0xffffff80444f0428 vendor.xxxyyy.ha-1593[004] 9436.216390:timer_init timer=0xffffff80444f0428 vendor.xxxyyy.ha-1593[004] 9436.216392:timer_start timer=0xffffff80444f0428function=__typeid__ZTSFvP10timer_listE_global_addrexpires=0x10022da2cnow=0x10022da1dflags=186646532 vendor.xxxyyy.ha-1593[005] 9436.220992:timer_cancel timer=0xffffff80444f0428 xxxyyyTraceManag-7795[004] 9436.261641:timer_cancel timer=0xffffff80444f0428 [2] 9436.261653][C4] Unable to handle kernel paging request at virtual address dead00000000012a [ 9436.261664][C4] Mem abort info: [ 9436.261666][C4] ESR = 0x96000044 [ 9436.261669][C4] EC = 0x25: DABT (current EL), IL = 32 bits [ 9436.261671][C4] SET = 0, FnV = 0 [ 9436.261673][C4] EA = 0, S1PTW = 0 [ 9436.261675][C4] Data abort info: [ 9436.261677][C4] ISV = 0, ISS = 0x00000044 [ 9436.261680][C4] CM = 0, WnR = 1 [ 9436.261682][C4] [dead00000000012a] address between user and kernel address ranges [ 9436.261685][C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP [ 9436.261701][C4] Skip md ftrace buffer dump for: 0x3a982d0 ... [ 9436.262138][C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G SWO5.10.149-android12-9-o-g17f915d29d0c #1 [ 9436.262141][C4] Hardware name: Qualcomm Technologies, Inc.(DT) [ 9436.262144][C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--) [ 9436.262161][C4] pc : expire_timers+0x9c/0x438 [ 9436.262164][C4] lr : expire_timers+0x2a4/0x438 [ 9436.262168][C4] sp : ffffffc010023dd0 [ 9436.262171][C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18 [ 9436.262178][C4] x27: ffffffd063569dd0 x26: ffffffd063536008 [ 9436.262182][C4] x25: 0000000000000001 x24: ffffff88f7c69280 [ 9436.262185][C4] x23: 00000000000000e0 x22: dead000000000122 [ 9436.262188][C4] x21: 000000010022da29 x20: ffffff8af72b4e80 [ 9436.262191][C4] x19: ffffffc010023e50 x18: ffffffc010025038 [ 9436.262195][C4] x17: 0000000000000240 x16: 0000000000000201 [ 9436.262199][C4] x15: ffffffffffffffff x14: ffffff889f3c3100 [ 9436.262203][C4] x13: ffffff889f3c3100 x12: 00000000049f56b8 [ 9436.262207][C4] x11: 00000000049f56b8 x10: 00000000ffffffff [ 9436.262212][C4] x9 : ffffffc010023e50 x8 : dead000000000122 [ 9436.262216][C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8 [ 9436.262220][C4] x5 : 0000000000000000 x4 : 0000000000000101 [ 9436.262223][C4] x3 : 0000000000000080 x2 : ffffff8 ---truncated---

Solution(s)

  • amazon-linux-ami-2-upgrade-bpftool
  • amazon-linux-ami-2-upgrade-bpftool-debuginfo
  • amazon-linux-ami-2-upgrade-kernel
  • amazon-linux-ami-2-upgrade-kernel-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64
  • amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64
  • amazon-linux-ami-2-upgrade-kernel-devel
  • amazon-linux-ami-2-upgrade-kernel-headers
  • amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-210-201-852
  • amazon-linux-ami-2-upgrade-kernel-tools
  • amazon-linux-ami-2-upgrade-kernel-tools-debuginfo
  • amazon-linux-ami-2-upgrade-kernel-tools-devel
  • amazon-linux-ami-2-upgrade-perf
  • amazon-linux-ami-2-upgrade-perf-debuginfo
  • amazon-linux-ami-2-upgrade-python-perf
  • amazon-linux-ami-2-upgrade-python-perf-debuginfo

References

  • https://attackerkb.com/topics/cve-2023-52635
  • AL2/ALASKERNEL-5.10-2024-053
  • CVE - 2023-52635
  • 查看数 713
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…