CVE-2024-35875: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: x86/coco: Require seeding RNG with RDRAND on CoCo systems There are few uses of CoCo that don't rely on working cryptography and hence a working RNG. Unfortunately, the CoCo threat model means that the VM host cannot be trusted and may actively work against guests to extract secrets or manipulate computation. Since a malicious host can modify or observe nearly all inputs to guests, the only remaining source of entropy for CoCo guests is RDRAND. If RDRAND is broken -- due to CPU hardware fault -- the RNG as a whole is meant to gracefully continue on gathering entropy from other sources, but since there aren't other sources on CoCo, this is catastrophic. This is mostly a concern at boot time when initially seeding the RNG, as after that the consequences of a broken RDRAND are much more theoretical. So, try at boot to seed the RNG using 256 bits of RDRAND output. If this fails, panic(). This will also trigger if the system is booted without RDRAND, as RDRAND is essential for a safe CoCo boot. Add this deliberately to be "just a CoCo x86 driver feature" and not part of the RNG itself. Many device drivers and platforms have some desire to contribute something to the RNG, and add_device_randomness() is specifically meant for this purpose. Any driver can call it with seed data of any quality, or even garbage quality, and it can only possibly make the quality of the RNG better or have no effect, but can never make it worse. Rather than trying to build something into the core of the RNG, consider the particular CoCo issue just a CoCo issue, and therefore separate it all out into driver (well, arch/platform) code. [ bp: Massage commit message. ]
AI Analysis
Technical Summary
CVE-2024-35875 addresses a vulnerability in the Linux kernel specifically related to the x86 architecture on Confidential Computing (CoCo) systems. CoCo systems operate under a threat model where the virtual machine (VM) host is considered untrusted and may actively attempt to extract secrets or manipulate computations within guest VMs. In such environments, cryptographic operations and secure random number generation (RNG) are critical for maintaining confidentiality and integrity. The vulnerability arises because CoCo guests rely almost exclusively on the CPU's RDRAND instruction as the sole entropy source for seeding their RNG at boot time. If RDRAND is faulty or compromised due to hardware defects or malicious interference, the RNG cannot be properly seeded, leading to catastrophic failures in cryptographic operations. The Linux kernel patch enforces a strict requirement that at boot time, the RNG must be seeded with 256 bits of entropy from RDRAND. If this seeding fails, the system triggers a kernel panic, effectively halting the boot process to prevent insecure operation. This approach isolates the fix to the CoCo x86 driver rather than the core RNG subsystem, acknowledging that other platforms may have different entropy sources. The patch also leverages the add_device_randomness() interface to contribute entropy safely without degrading RNG quality. This vulnerability primarily impacts the initial boot phase, as subsequent entropy gathering is less dependent on RDRAND alone. No known exploits are reported in the wild, and the vulnerability was published on May 19, 2024.
Potential Impact
For European organizations utilizing Linux-based CoCo systems, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive computations and cryptographic keys. If RDRAND fails or is compromised, the RNG seeding process will fail, causing the system to panic and halt booting. While this prevents insecure operation, it also results in availability issues, potentially causing downtime for critical services relying on CoCo VMs. Organizations in sectors such as finance, healthcare, and government that deploy confidential computing for data protection and regulatory compliance may experience operational disruptions. Moreover, the reliance on hardware RNG means that hardware faults or supply chain attacks targeting CPU microcode or firmware could exacerbate the risk. The inability to boot securely could delay incident response or system recovery. However, since the vulnerability is contained to CoCo x86 platforms and triggers a fail-safe panic, it reduces the risk of silent compromise but increases the risk of availability impact during boot failures.
Mitigation Recommendations
European organizations should ensure that their Linux kernel versions are updated to include the patch that enforces RDRAND seeding on CoCo systems. Specifically, they should: 1) Verify that all CoCo x86 systems run kernel versions incorporating the fix for CVE-2024-35875. 2) Conduct hardware validation to confirm that CPU RDRAND instructions operate correctly and are not affected by firmware or microcode issues. 3) Implement monitoring to detect kernel panics related to RNG seeding failures during boot, enabling rapid incident response. 4) Engage with hardware vendors to ensure supply chain integrity and timely microcode updates that maintain RDRAND reliability. 5) For critical environments, consider fallback entropy sources or architectural changes to reduce sole reliance on RDRAND, if feasible, while maintaining the CoCo threat model. 6) Document and test recovery procedures for systems that fail to boot due to this panic condition to minimize downtime. These steps go beyond generic patching by emphasizing hardware validation, monitoring, and operational preparedness specific to the CoCo threat model.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2024-35875: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: x86/coco: Require seeding RNG with RDRAND on CoCo systems There are few uses of CoCo that don't rely on working cryptography and hence a working RNG. Unfortunately, the CoCo threat model means that the VM host cannot be trusted and may actively work against guests to extract secrets or manipulate computation. Since a malicious host can modify or observe nearly all inputs to guests, the only remaining source of entropy for CoCo guests is RDRAND. If RDRAND is broken -- due to CPU hardware fault -- the RNG as a whole is meant to gracefully continue on gathering entropy from other sources, but since there aren't other sources on CoCo, this is catastrophic. This is mostly a concern at boot time when initially seeding the RNG, as after that the consequences of a broken RDRAND are much more theoretical. So, try at boot to seed the RNG using 256 bits of RDRAND output. If this fails, panic(). This will also trigger if the system is booted without RDRAND, as RDRAND is essential for a safe CoCo boot. Add this deliberately to be "just a CoCo x86 driver feature" and not part of the RNG itself. Many device drivers and platforms have some desire to contribute something to the RNG, and add_device_randomness() is specifically meant for this purpose. Any driver can call it with seed data of any quality, or even garbage quality, and it can only possibly make the quality of the RNG better or have no effect, but can never make it worse. Rather than trying to build something into the core of the RNG, consider the particular CoCo issue just a CoCo issue, and therefore separate it all out into driver (well, arch/platform) code. [ bp: Massage commit message. ]
AI-Powered Analysis
Technical Analysis
CVE-2024-35875 addresses a vulnerability in the Linux kernel specifically related to the x86 architecture on Confidential Computing (CoCo) systems. CoCo systems operate under a threat model where the virtual machine (VM) host is considered untrusted and may actively attempt to extract secrets or manipulate computations within guest VMs. In such environments, cryptographic operations and secure random number generation (RNG) are critical for maintaining confidentiality and integrity. The vulnerability arises because CoCo guests rely almost exclusively on the CPU's RDRAND instruction as the sole entropy source for seeding their RNG at boot time. If RDRAND is faulty or compromised due to hardware defects or malicious interference, the RNG cannot be properly seeded, leading to catastrophic failures in cryptographic operations. The Linux kernel patch enforces a strict requirement that at boot time, the RNG must be seeded with 256 bits of entropy from RDRAND. If this seeding fails, the system triggers a kernel panic, effectively halting the boot process to prevent insecure operation. This approach isolates the fix to the CoCo x86 driver rather than the core RNG subsystem, acknowledging that other platforms may have different entropy sources. The patch also leverages the add_device_randomness() interface to contribute entropy safely without degrading RNG quality. This vulnerability primarily impacts the initial boot phase, as subsequent entropy gathering is less dependent on RDRAND alone. No known exploits are reported in the wild, and the vulnerability was published on May 19, 2024.
Potential Impact
For European organizations utilizing Linux-based CoCo systems, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive computations and cryptographic keys. If RDRAND fails or is compromised, the RNG seeding process will fail, causing the system to panic and halt booting. While this prevents insecure operation, it also results in availability issues, potentially causing downtime for critical services relying on CoCo VMs. Organizations in sectors such as finance, healthcare, and government that deploy confidential computing for data protection and regulatory compliance may experience operational disruptions. Moreover, the reliance on hardware RNG means that hardware faults or supply chain attacks targeting CPU microcode or firmware could exacerbate the risk. The inability to boot securely could delay incident response or system recovery. However, since the vulnerability is contained to CoCo x86 platforms and triggers a fail-safe panic, it reduces the risk of silent compromise but increases the risk of availability impact during boot failures.
Mitigation Recommendations
European organizations should ensure that their Linux kernel versions are updated to include the patch that enforces RDRAND seeding on CoCo systems. Specifically, they should: 1) Verify that all CoCo x86 systems run kernel versions incorporating the fix for CVE-2024-35875. 2) Conduct hardware validation to confirm that CPU RDRAND instructions operate correctly and are not affected by firmware or microcode issues. 3) Implement monitoring to detect kernel panics related to RNG seeding failures during boot, enabling rapid incident response. 4) Engage with hardware vendors to ensure supply chain integrity and timely microcode updates that maintain RDRAND reliability. 5) For critical environments, consider fallback entropy sources or architectural changes to reduce sole reliance on RDRAND, if feasible, while maintaining the CoCo threat model. 6) Document and test recovery procedures for systems that fail to boot due to this panic condition to minimize downtime. These steps go beyond generic patching by emphasizing hardware validation, monitoring, and operational preparedness specific to the CoCo threat model.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.110Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3746
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 4:57:09 PM
Last updated: 8/2/2025, 10:04:55 PM
Views: 13
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.