|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-3640: kernel-source,kernel-source-rt,kernel-source-azure: x86/mm: per-cpu entry area leak via init_cea_offsets() | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Carlos López <carlos.lopez> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | Andreas.Stieger, gianluca.gabrielli, jack, jdelvare, meissner, mhocko, mkoutny, pmladek, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/372250/ | ||
| See Also: | https://bugzilla.suse.com/show_bug.cgi?id=1207845 | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-3640:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Carlos López
2023-07-13 06:37:50 UTC
Nik, are you aware of any developments here? Nope This security issue only refers to leaks of pointers in the per CPU area. This area does not contain userdata or sensitive data, but pointers into other areas of the kernel. So no user sensitive information can be leaked by this issue. There is also no code execution possible directly due to this leak, it can only be used to bypass protection measure like KASLR. I spoke with Thomas Gleixner and the conclusion is -EWONTFIX, basically so long as there is a mapping there is an attack vector: > <tglx> but yes, you can still do speculative attacks on it because it is mapped into user space > <tglx> you can do that on the entry code too > <tglx> but as long as there is a mapping there is an attack vector > <tglx> again > <tglx> KASLR is not defendable against a local host attack on x86 Looking at the fix for the previous CVE: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97e3d26b5e5f371b3ee223d94dd123e6c442ba80 The init_cea_offsets already randomizes the placement of the percpu areas within the 512g range. (In reply to Nikolay Borisov from comment #16) > I spoke with Thomas Gleixner and the conclusion is -EWONTFIX, basically so > long as there is a mapping there is an attack vector: > > > <tglx> but yes, you can still do speculative attacks on it because it is mapped into user space > > <tglx> you can do that on the entry code too > > <tglx> but as long as there is a mapping there is an attack vector > > <tglx> again > > <tglx> KASLR is not defendable against a local host attack on x86 > > Looking at the fix for the previous CVE: > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/ > ?id=97e3d26b5e5f371b3ee223d94dd123e6c442ba80 > > The init_cea_offsets already randomizes the placement of the percpu areas > within the 512g range. And PeterZ's opinion: > <peterz> everybody that thinks kaslr is any good for local attacks is sniffing glue > <peterz> nist should just stop accepting CVEs against linux Given all of this I'd say this CVE is a way for someone to try and gain some fame aka security theatre.... I am not sure how to close this bug or if we want to keep it open for next few years. Anyway: + The comment #14 describes quite well that the risk is pretty low. Also it affects "only" Meltdown'd CPUs. + The comment #16 suggests that the risk has been lowered even more by randomizing the per_cpu area. + The comment #16 and comment #17 and comment #18 shows that the key upstream people do not consider it worth an effort. Is this enough to dispute the CVE, please? I guess it is clear by now we aren't going to fix this. So I'm reassigning back to security team to decide whether we should close as WONTFIX or dispute the CVE... We agreed to close this as WONTFIX |