In the Linux kernel, the following vulnerability has been resolved:
of: check previous kernel's ima-kexec-buffer against memory bounds
Presently imagetkexec_buffer() doesn't check if the previous kernel's ima-kexec-buffer lies outside the addressable memory range. This can result in a kernel panic if the new kernel is booted with 'mem=X' arg and the ima-kexec-buffer was allocated beyond that range by the previous kernel. The panic is usually of the form below:
$ sudo kexec --initrd initrd vmlinux --append='mem=16G'
<snip> BUG: Unable to handle kernel data access on read at 0xc000c01fff7f0000 Faulting instruction address: 0xc000000000837974 Oops: Kernel access of bad area, sig: 11 [#1] <snip> NIP [c000000000837974] imarestoremeasurementlist+0x94/0x6c0 LR [c00000000083b55c] imaloadkexecbuffer+0xac/0x160 Call Trace: [c00000000371fa80] [c00000000083b55c] imaloadkexecbuffer+0xac/0x160 [c00000000371fb00] [c0000000020512c4] imainit+0x80/0x108 [c00000000371fb70] [c0000000020514dc] initima+0x4c/0x120 [c00000000371fbf0] [c000000000012240] dooneinitcall+0x60/0x2c0 [c00000000371fcc0] [c000000002004ad0] kernelinitfreeable+0x344/0x3ec [c00000000371fda0] [c0000000000128a4] kernelinit+0x34/0x1b0 [c00000000371fe10] [c00000000000ce64] retfromkernel_thread+0x5c/0x64 Instruction dump: f92100b8 f92100c0 90e10090 910100a0 4182050c 282a0017 3bc00000 40810330 7c0802a6 fb610198 7c9b2378 f80101d0 <a1240000> 2c090001 40820614 e9240010 ---[ end trace 0000000000000000 ]---
Fix this issue by checking returned PFN range of previous kernel's ima-kexec-buffer with pageisram() to ensure correct memory bounds.
{ "vanir_signatures": [ { "id": "CVE-2022-50159-1a01f024", "deprecated": false, "digest": { "threshold": 0.9, "line_hashes": [ "46575601503941681999406664333357061349", "248476312692028839468940096173588518582", "166291506870999091712887418392717099193", "234391702787891957181049365903514934316", "277110003330788561753997257888955011950", "155843829393364814276629572371003758322", "270831162297440101141755161327386534256" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@beb5bba5dd132650c073f815c685c60c3e5b783b", "target": { "file": "drivers/of/kexec.c" }, "signature_type": "Line", "signature_version": "v1" }, { "id": "CVE-2022-50159-3136176a", "deprecated": false, "digest": { "threshold": 0.9, "line_hashes": [ "46575601503941681999406664333357061349", "248476312692028839468940096173588518582", "166291506870999091712887418392717099193", "234391702787891957181049365903514934316", "277110003330788561753997257888955011950", "155843829393364814276629572371003758322", "270831162297440101141755161327386534256" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc3b8525f83ac6bbc885bb24bbb8a76f4622200e", "target": { "file": "drivers/of/kexec.c" }, "signature_type": "Line", "signature_version": "v1" }, { "id": "CVE-2022-50159-42717b77", "deprecated": false, "digest": { "function_hash": "329720791919086806944413979251726322326", "length": 413.0 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cbf9c4b9617b6767886a913705ca14b7600c77db", "target": { "file": "drivers/of/kexec.c", "function": "ima_get_kexec_buffer" }, "signature_type": "Function", "signature_version": "v1" }, { "id": "CVE-2022-50159-53a5d9ea", "deprecated": false, "digest": { "function_hash": "329720791919086806944413979251726322326", "length": 413.0 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@beb5bba5dd132650c073f815c685c60c3e5b783b", "target": { "file": "drivers/of/kexec.c", "function": "ima_get_kexec_buffer" }, "signature_type": "Function", "signature_version": "v1" }, { "id": "CVE-2022-50159-7196e744", "deprecated": false, "digest": { "function_hash": "329720791919086806944413979251726322326", "length": 413.0 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dc3b8525f83ac6bbc885bb24bbb8a76f4622200e", "target": { "file": "drivers/of/kexec.c", "function": "ima_get_kexec_buffer" }, "signature_type": "Function", "signature_version": "v1" }, { "id": "CVE-2022-50159-7c1d084b", "deprecated": false, "digest": { "function_hash": "329720791919086806944413979251726322326", "length": 413.0 }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b2263d6c86fca8f30e18231778393bfc287bb27", "target": { "file": "drivers/of/kexec.c", "function": "ima_get_kexec_buffer" }, "signature_type": "Function", "signature_version": "v1" }, { "id": "CVE-2022-50159-ac727554", "deprecated": false, "digest": { "threshold": 0.9, "line_hashes": [ "46575601503941681999406664333357061349", "248476312692028839468940096173588518582", "166291506870999091712887418392717099193", "234391702787891957181049365903514934316", "277110003330788561753997257888955011950", "155843829393364814276629572371003758322", "270831162297440101141755161327386534256" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1b2263d6c86fca8f30e18231778393bfc287bb27", "target": { "file": "drivers/of/kexec.c" }, "signature_type": "Line", "signature_version": "v1" }, { "id": "CVE-2022-50159-c122567f", "deprecated": false, "digest": { "threshold": 0.9, "line_hashes": [ "46575601503941681999406664333357061349", "248476312692028839468940096173588518582", "166291506870999091712887418392717099193", "234391702787891957181049365903514934316", "277110003330788561753997257888955011950", "155843829393364814276629572371003758322", "270831162297440101141755161327386534256" ] }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cbf9c4b9617b6767886a913705ca14b7600c77db", "target": { "file": "drivers/of/kexec.c" }, "signature_type": "Line", "signature_version": "v1" } ] }