CVE-2024-35944

Updated: 2024-07-14 04:31:14.666956

Description:

In the Linux kernel, the following vulnerability has been resolved: VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() Syzkaller hit 'WARNING in dg_dispatch_as_host' bug. memcpy: detected field-spanning write (size 56) of single field "&dg_info->msg" at drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24) WARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237 dg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237 Some code commentry, based on my understanding: 544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)->payload_size) /// This is 24 + payload_size memcpy(&dg_info->msg, dg, dg_size); Destination = dg_info->msg ---> this is a 24 byte structure(struct vmci_datagram) Source = dg --> this is a 24 byte structure (struct vmci_datagram) Size = dg_size = 24 + payload_size {payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32. 35 struct delayed_datagram_info { 36 struct datagram_entry *entry; 37 struct work_struct work; 38 bool in_dg_host_queue; 39 /* msg and msg_payload must be together. */ 40 struct vmci_datagram msg; 41 u8 msg_payload[]; 42 }; So those extra bytes of payload are copied into msg_payload[], a run time warning is seen while fuzzing with Syzkaller. One possible way to fix the warning is to split the memcpy() into two parts -- one -- direct assignment of msg and second taking care of payload. Gustavo quoted: "Under FORTIFY_SOURCE we should not copy data across multiple members in a structure."


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Ignored 2024-09-25 12:26:32
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-25 12:26:32
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-25 12:26:32
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2024:1727690947 2024-09-30 10:47:51
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2024:1727690025 2024-09-30 10:47:52
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2024:1727815919 2024-10-01 17:28:12
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-25 12:26:32
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-09-25 12:26:32
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-09-25 12:26:32
Ubuntu 16.04 ELS linux-hwe 4.15.0 5.5 MEDIUM Released CLSA-2024:1721664120 2024-07-22 14:22:58
Total: 12