In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Don't crash in stack_top() for tasks without vDSO
Not all tasks have a vDSO mapped, for example kthreads never do. If such a task ever ends up calling stack_top(), it will derefence the NULL vdso pointer and crash.
This can for example happen when using kunit:
[<9000000000203874>] stack_top+0x58/0xa8
[<90000000002956cc>] arch_pick_mmap_layout+0x164/0x220
[<90000000003c284c>] kunit_vm_mmap_init+0x108/0x12c
[<90000000003c1fbc>] __kunit_add_resource+0x38/0x8c
[<90000000003c2704>] kunit_vm_mmap+0x88/0xc8
[<9000000000410b14>] usercopy_test_init+0xbc/0x25c
[<90000000003c1db4>] kunit_try_run_case+0x5c/0x184
[<90000000003c3d54>] kunit_generic_run_threadfn_adapter+0x24/0x48
[<900000000022e4bc>] kthread+0xc8/0xd4
[<9000000000200ce8>] ret_from_kernel_thread+0xc/0xa4
[
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "arch/loongarch/kernel/process.c",
"function": "stack_top"
},
"digest": {
"length": 237.0,
"function_hash": "247376833642599339684183898198687937281"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a94c197d4d749954dfaa37e907fcc8c04e4aad7e",
"signature_version": "v1",
"id": "CVE-2024-50133-1301d174"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "arch/loongarch/kernel/process.c"
},
"digest": {
"line_hashes": [
"252371722138278640917241645227640436899",
"120462653856221528357938449283547099222",
"237287511150447638150773963862077046102",
"105579245716115214523197203353572092042",
"146673814896181790362712674416251611437",
"221778099946814380693429125042175906728",
"311807471554538287499496573203833481378"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@134475a9ab8487527238d270639a8cb74c10aab2",
"signature_version": "v1",
"id": "CVE-2024-50133-54929f15"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "arch/loongarch/kernel/process.c",
"function": "stack_top"
},
"digest": {
"length": 237.0,
"function_hash": "247376833642599339684183898198687937281"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@041cc3860b06770357876d1114d615333b0fbf31",
"signature_version": "v1",
"id": "CVE-2024-50133-55f18bdf"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "arch/loongarch/kernel/process.c"
},
"digest": {
"line_hashes": [
"252371722138278640917241645227640436899",
"120462653856221528357938449283547099222",
"237287511150447638150773963862077046102",
"105579245716115214523197203353572092042",
"146673814896181790362712674416251611437",
"221778099946814380693429125042175906728",
"311807471554538287499496573203833481378"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a94c197d4d749954dfaa37e907fcc8c04e4aad7e",
"signature_version": "v1",
"id": "CVE-2024-50133-8687c5a0"
},
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "arch/loongarch/kernel/process.c"
},
"digest": {
"line_hashes": [
"252371722138278640917241645227640436899",
"120462653856221528357938449283547099222",
"237287511150447638150773963862077046102",
"105579245716115214523197203353572092042",
"146673814896181790362712674416251611437",
"221778099946814380693429125042175906728",
"311807471554538287499496573203833481378"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@041cc3860b06770357876d1114d615333b0fbf31",
"signature_version": "v1",
"id": "CVE-2024-50133-90d30e7c"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "arch/loongarch/kernel/process.c",
"function": "stack_top"
},
"digest": {
"length": 237.0,
"function_hash": "247376833642599339684183898198687937281"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@134475a9ab8487527238d270639a8cb74c10aab2",
"signature_version": "v1",
"id": "CVE-2024-50133-b5c2205c"
}
]