Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-35875
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 May, 2024 | 08:34
Updated At-05 Jan, 2026 | 10:35
Rejected At-
▼CVE Numbering Authority (CNA)
x86/coco: Require seeding RNG with RDRAND on CoCo systems

In the Linux kernel, the following vulnerability has been resolved: x86/coco: Require seeding RNG with RDRAND on CoCo systems There are few uses of CoCo that don't rely on working cryptography and hence a working RNG. Unfortunately, the CoCo threat model means that the VM host cannot be trusted and may actively work against guests to extract secrets or manipulate computation. Since a malicious host can modify or observe nearly all inputs to guests, the only remaining source of entropy for CoCo guests is RDRAND. If RDRAND is broken -- due to CPU hardware fault -- the RNG as a whole is meant to gracefully continue on gathering entropy from other sources, but since there aren't other sources on CoCo, this is catastrophic. This is mostly a concern at boot time when initially seeding the RNG, as after that the consequences of a broken RDRAND are much more theoretical. So, try at boot to seed the RNG using 256 bits of RDRAND output. If this fails, panic(). This will also trigger if the system is booted without RDRAND, as RDRAND is essential for a safe CoCo boot. Add this deliberately to be "just a CoCo x86 driver feature" and not part of the RNG itself. Many device drivers and platforms have some desire to contribute something to the RNG, and add_device_randomness() is specifically meant for this purpose. Any driver can call it with seed data of any quality, or even garbage quality, and it can only possibly make the quality of the RNG better or have no effect, but can never make it worse. Rather than trying to build something into the core of the RNG, consider the particular CoCo issue just a CoCo issue, and therefore separate it all out into driver (well, arch/platform) code. [ bp: Massage commit message. ]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/coco/core.c
  • arch/x86/include/asm/coco.h
  • arch/x86/kernel/setup.c
Default Status
unaffected
Versions
Affected
  • From d8aa7eea78a1401cce39b3bb61ead0150044a3df before 22943e4fe4b3a2dcbadc3d38d5bf840bbdbfe374 (git)
  • From d8aa7eea78a1401cce39b3bb61ead0150044a3df before 453b5f2dec276c1bb4ea078bf8c0da57ee4627e5 (git)
  • From d8aa7eea78a1401cce39b3bb61ead0150044a3df before 08044b08b37528b82f70a87576c692b4e4b7716e (git)
  • From d8aa7eea78a1401cce39b3bb61ead0150044a3df before 99485c4c026f024e7cb82da84c7951dbe3deb584 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/x86/coco/core.c
  • arch/x86/include/asm/coco.h
  • arch/x86/kernel/setup.c
Default Status
affected
Versions
Affected
  • 4.15
Unaffected
  • From 0 before 4.15 (semver)
  • From 6.1.85 through 6.1.* (semver)
  • From 6.6.26 through 6.6.* (semver)
  • From 6.8.5 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/22943e4fe4b3a2dcbadc3d38d5bf840bbdbfe374
N/A
https://git.kernel.org/stable/c/453b5f2dec276c1bb4ea078bf8c0da57ee4627e5
N/A
https://git.kernel.org/stable/c/08044b08b37528b82f70a87576c692b4e4b7716e
N/A
https://git.kernel.org/stable/c/99485c4c026f024e7cb82da84c7951dbe3deb584
N/A
Hyperlink: https://git.kernel.org/stable/c/22943e4fe4b3a2dcbadc3d38d5bf840bbdbfe374
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/453b5f2dec276c1bb4ea078bf8c0da57ee4627e5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/08044b08b37528b82f70a87576c692b4e4b7716e
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/99485c4c026f024e7cb82da84c7951dbe3deb584
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/22943e4fe4b3a2dcbadc3d38d5bf840bbdbfe374
x_transferred
https://git.kernel.org/stable/c/453b5f2dec276c1bb4ea078bf8c0da57ee4627e5
x_transferred
https://git.kernel.org/stable/c/08044b08b37528b82f70a87576c692b4e4b7716e
x_transferred
https://git.kernel.org/stable/c/99485c4c026f024e7cb82da84c7951dbe3deb584
x_transferred
Hyperlink: https://git.kernel.org/stable/c/22943e4fe4b3a2dcbadc3d38d5bf840bbdbfe374
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/453b5f2dec276c1bb4ea078bf8c0da57ee4627e5
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/08044b08b37528b82f70a87576c692b4e4b7716e
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/99485c4c026f024e7cb82da84c7951dbe3deb584
Resource:
x_transferred
Details not found