Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-52499— powerpc/47x: Fix 47x syscall return crash

EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-52499

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
powerpc/47x: Fix 47x syscall return crash
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: powerpc/47x: Fix 47x syscall return crash Eddie reported that newer kernels were crashing during boot on his 476 FSP2 system: kernel tried to execute user page (b7ee2000) - exploit attempt? (uid: 0) BUG: Unable to handle kernel instruction fetch Faulting instruction address: 0xb7ee2000 Oops: Kernel access of bad area, sig: 11 [#1] BE PAGE_SIZE=4K FSP-2 Modules linked in: CPU: 0 PID: 61 Comm: mount Not tainted 6.1.55-d23900f.ppcnf-fsp2 #1 Hardware name: ibm,fsp2 476fpe 0x7ff520c0 FSP-2 NIP:  b7ee2000 LR: 8c008000 CTR: 00000000 REGS: bffebd83 TRAP: 0400   Not tainted (6.1.55-d23900f.ppcnf-fs p2) MSR:  00000030 <IR,DR>  CR: 00001000  XER: 20000000 GPR00: c00110ac bffebe63 bffebe7e bffebe88 8c008000 00001000 00000d12 b7ee2000 GPR08: 00000033 00000000 00000000 c139df10 48224824 1016c314 10160000 00000000 GPR16: 10160000 10160000 00000008 00000000 10160000 00000000 10160000 1017f5b0 GPR24: 1017fa50 1017f4f0 1017fa50 1017f740 1017f630 00000000 00000000 1017f4f0 NIP [b7ee2000] 0xb7ee2000 LR [8c008000] 0x8c008000 Call Trace: Instruction dump: XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX ---[ end trace 0000000000000000 ]--- The problem is in ret_from_syscall where the check for icache_44x_need_flush is done. When the flush is needed the code jumps out-of-line to do the flush, and then intends to jump back to continue the syscall return. However the branch back to label 1b doesn't return to the correct location, instead branching back just prior to the return to userspace, causing bogus register values to be used by the rfi. The breakage was introduced by commit 6f76a01173cc ("powerpc/syscall: implement system call entry/exit logic in C for PPC32") which inadvertently removed the "1" label and reused it elsewhere. Fix it by adding named local labels in the correct locations. Note that the return label needs to be outside the ifdef so that CONFIG_PPC_47x=n compiles.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于无法处理内核指令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 6f76a01173ccaa363739f913394d4e138d92d718 ~ 29017ab1a539101d9c7bec63cc13a019f97b2820 -
LinuxLinux 5.12 -

II. Public POCs for CVE-2023-52499

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-52499

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-03-02 · 57 CVEs total

CVE-2023-52563drm/meson: fix memory leak on ->hpd_notify callback
CVE-2023-52581netfilter: nf_tables: fix memleak when more than 255 elements expired
CVE-2023-52574team: fix null-ptr-deref when team device type is changed
CVE-2023-52578net: bridge: use DEV_STATS_INC()
CVE-2023-52577dccp: fix dccp_v4_err()/dccp_v6_err() again
CVE-2023-52576x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()
CVE-2023-52580net/core: Fix ETH_P_1588 flow dissector
CVE-2023-52566nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()
CVE-2023-52565media: uvcvideo: Fix OOB read
CVE-2023-52564Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux"
CVE-2023-52567serial: 8250_port: Check IRQ data before use
CVE-2023-52562mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()
CVE-2023-52561arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved
CVE-2023-52560mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()
CVE-2023-52559iommu/vt-d: Avoid memory allocation in iommu_suspend()
CVE-2023-52518Bluetooth: hci_codec: Fix leaking content of local_codecs
CVE-2023-52532net: mana: Fix TX CQE error handling
CVE-2023-52531wifi: iwlwifi: mvm: Fix a memory corruption issue
CVE-2023-52530wifi: mac80211: fix potential key use-after-free
CVE-2023-52529HID: sony: Fix a potential memory leak in sony_probe()

Showing top 20 of 57 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2023-52499

No comments yet


Leave a comment