In the Linux kernel, the following vulnerability has been resolved:
powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06
Johan reported the below crash with test_bpf on ppc64 e5500:
testbpf: #296 ALUENDFROMLE 64: 0x0123456789abcdef -> 0x67452301 jited:1 Oops: Exception in kernel mode, sig: 4 [#1] BE PAGESIZE=4K SMP NRCPUS=24 QEMU e500 Modules linked in: testbpf(+) CPU: 0 PID: 76 Comm: insmod Not tainted 5.14.0-03771-g98c2059e008a-dirty #1 NIP: 8000000000061c3c LR: 80000000006dea64 CTR: 8000000000061c18 REGS: c0000000032d3420 TRAP: 0700 Not tainted (5.14.0-03771-g98c2059e008a-dirty) MSR: 0000000080089000 <EE,ME> CR: 88002822 XER: 20000000 IRQMASK: 0 <...> NIP [8000000000061c3c] 0x8000000000061c3c LR [80000000006dea64] .runone+0x104/0x17c [testbpf] Call Trace: .runone+0x60/0x17c [testbpf] (unreliable) .testbpfinit+0x6a8/0xdc8 [testbpf] .dooneinitcall+0x6c/0x28c .doinitmodule+0x68/0x28c .loadmodule+0x2460/0x2abc .dosysinitmodule+0x120/0x18c .systemcallexception+0x110/0x1b8 systemcallcommon+0xf0/0x210 --- interrupt: c00 at 0x101d0acc <...> ---[ end trace 47b2bf19090bb3d0 ]---
Illegal instruction
The illegal instruction turned out to be 'ldbrx' emitted for BPFFROM[L|B]E, which was only introduced in ISA v2.06. Guard use of the same and implement an alternative approach for older processors.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48755.json"
}[
{
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-48755-204b34a2",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"105239462629332358716258232575426498397",
"32103527024201341607003675759108241246",
"220587104161106472041809474549398749580",
"143652877451514349920477468941264021020",
"282561266842276753911049100100607246021",
"129268393788246293310497742440470261751"
]
},
"target": {
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aaccfeeee1630b155e8ff0d6c449d3de1ef86e73"
},
{
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-48755-2f33ab10",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"105239462629332358716258232575426498397",
"32103527024201341607003675759108241246",
"220587104161106472041809474549398749580",
"143652877451514349920477468941264021020",
"282561266842276753911049100100607246021",
"129268393788246293310497742440470261751"
]
},
"target": {
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3bfbc00587dc883eaed383558ae512a351c2cd09"
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-48755-3332dfbf",
"deprecated": false,
"digest": {
"function_hash": "155182815654196285202857402353000354879",
"length": 17984.0
},
"target": {
"function": "bpf_jit_build_body",
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@aaccfeeee1630b155e8ff0d6c449d3de1ef86e73"
},
{
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-48755-385a11a2",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"105239462629332358716258232575426498397",
"32103527024201341607003675759108241246",
"220587104161106472041809474549398749580",
"143652877451514349920477468941264021020",
"282561266842276753911049100100607246021",
"129268393788246293310497742440470261751"
]
},
"target": {
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f5f766d5f7f95a69a630da3544a1a0cee1cdddf"
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-48755-85fff687",
"deprecated": false,
"digest": {
"function_hash": "150369591766594772971143148946457470905",
"length": 17745.0
},
"target": {
"function": "bpf_jit_build_body",
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@129c71829d7f46423d95c19e8d87ce956d4c6e1c"
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-48755-8f3e5870",
"deprecated": false,
"digest": {
"function_hash": "155182815654196285202857402353000354879",
"length": 17984.0
},
"target": {
"function": "bpf_jit_build_body",
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3bfbc00587dc883eaed383558ae512a351c2cd09"
},
{
"signature_version": "v1",
"signature_type": "Function",
"id": "CVE-2022-48755-c3d93e55",
"deprecated": false,
"digest": {
"function_hash": "200438703024651014207889232503807008796",
"length": 18804.0
},
"target": {
"function": "bpf_jit_build_body",
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f5f766d5f7f95a69a630da3544a1a0cee1cdddf"
},
{
"signature_version": "v1",
"signature_type": "Line",
"id": "CVE-2022-48755-feac1c7a",
"deprecated": false,
"digest": {
"threshold": 0.9,
"line_hashes": [
"105239462629332358716258232575426498397",
"32103527024201341607003675759108241246",
"220587104161106472041809474549398749580",
"143652877451514349920477468941264021020",
"282561266842276753911049100100607246021",
"129268393788246293310497742440470261751"
]
},
"target": {
"file": "arch/powerpc/net/bpf_jit_comp64.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@129c71829d7f46423d95c19e8d87ce956d4c6e1c"
}
]