CVE-2023-52504

Updated: 2024-12-12 00:02:11.035049

Description:

In the Linux kernel, the following vulnerability has been resolved: x86/alternatives: Disable KASAN in apply_alternatives() Fei has reported that KASAN triggers during apply_alternatives() on a 5-level paging machine: BUG: KASAN: out-of-bounds in rcu_is_watching() Read of size 4 at addr ff110003ee6419a0 by task swapper/0/0 ... __asan_load4() rcu_is_watching() trace_hardirqs_on() text_poke_early() apply_alternatives() ... On machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57) gets patched. It includes KASAN code, where KASAN_SHADOW_START depends on __VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled(). KASAN gets confused when apply_alternatives() patches the KASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START static, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue. Fix it for real by disabling KASAN while the kernel is patching alternatives. [ mingo: updated the changelog ]


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.1 HIGH Released CLSA-2025:1738671431 2025-02-05 02:21:28
AlmaLinux 9.2 FIPS kernel 5.14.0 7.1 HIGH Released CLSA-2025:1738670922 2025-02-05 02:21:29
CentOS 8.4 ELS kernel 4.18.0 7.1 HIGH In Testing CLSA-2025:1736778412 2025-02-01 23:55:01
CentOS 8.5 ELS kernel 4.18.0 7.1 HIGH In Testing CLSA-2025:1736778632 2025-02-11 00:36:51
Ubuntu 16.04 ELS linux 4.4.0 7.1 HIGH Not Vulnerable 2024-06-13 11:19:53
Ubuntu 18.04 ELS linux 4.15.0 7.1 HIGH Not Vulnerable 2024-06-13 11:19:53