In the Linux kernel, the following vulnerability has been resolved:
riscv: misaligned: Restrict user access to kernel memory
rawcopy{to,from}user() do not call accessok(), so this code allowed userspace to access any virtual memory address.
[
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2024-46792-32abe315",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a3b6ff6c896aee5ef9b581e40d0045ff04fcbc8c",
"digest": {
"line_hashes": [
"111734249469866553269068749114771353547",
"252011680277908855215595484779258764267",
"5049801541659462969841409992554028827",
"218041713236318198159577109914503130576",
"317896070352533965117005717341699234290",
"180382859415859378104525824137720003571",
"137441296790173543037732243640569045948",
"82860918310589947307769121304522807709"
],
"threshold": 0.9
},
"target": {
"file": "arch/riscv/kernel/traps_misaligned.c"
}
},
{
"signature_type": "Line",
"signature_version": "v1",
"id": "CVE-2024-46792-d43961b3",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b686ecdeacf6658e1348c1a32a08e2e72f7c0f00",
"digest": {
"line_hashes": [
"111734249469866553269068749114771353547",
"252011680277908855215595484779258764267",
"5049801541659462969841409992554028827",
"218041713236318198159577109914503130576",
"317896070352533965117005717341699234290",
"180382859415859378104525824137720003571",
"137441296790173543037732243640569045948",
"82860918310589947307769121304522807709"
],
"threshold": 0.9
},
"target": {
"file": "arch/riscv/kernel/traps_misaligned.c"
}
}
]