CVE-2024-38667

In the Linux kernel, the following vulnerability has been resolved: riscv: prevent pt_regs corruption for secondary idle threads Top of the kernel thread stack should be reserved for pt_regs. However this is not the case for the idle threads of the secondary boot harts. Their stacks overlap with their pt_regs, so both may get corrupted. Similar issue has been fixed for the primary hart, see c7cdd96eca28 ("riscv: prevent stack corruption by reserving task_pt_regs(p) early"). However that fix was not propagated to the secondary harts. The problem has been noticed in some CPU hotplug tests with V enabled. The function smp_callin stored several registers on stack, corrupting top of pt_regs structure including status field. As a result, kernel attempted to save or restore inexistent V context.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

30 May 2025, 19:30

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af - Mailing List, Patch () https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af - Patch
References () https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 - Mailing List, Patch () https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 - Patch
References () https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e - Mailing List, Patch () https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*

26 Jun 2024, 13:53

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 - () https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80 - Mailing List, Patch
References () https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e - () https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e - Mailing List, Patch
References () https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 - () https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44 - Mailing List, Patch
References () https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af - () https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af - Mailing List, Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CWE CWE-787

24 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-24 14:15

Updated : 2025-05-30 19:30


NVD link : CVE-2024-38667

Mitre link : CVE-2024-38667


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write