CVE-2024-38614

In the Linux kernel, the following vulnerability has been resolved: openrisc: traps: Don't send signals to kernel mode threads OpenRISC exception handling sends signals to user processes on floating point exceptions and trap instructions (for debugging) among others. There is a bug where the trap handling logic may send signals to kernel threads, we should not send these signals to kernel threads, if that happens we treat it as an error. This patch adds conditions to die if the kernel receives these exceptions in kernel mode code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Oct 2025, 15:26

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/075c0405b0d7d9fc490609e988a3af0069596538 - () https://git.kernel.org/stable/c/075c0405b0d7d9fc490609e988a3af0069596538 - Patch
References () https://git.kernel.org/stable/c/c0ed9a711e3392d73e857faa031d8d349c0d70db - () https://git.kernel.org/stable/c/c0ed9a711e3392d73e857faa031d8d349c0d70db - Patch
References () https://git.kernel.org/stable/c/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f - () https://git.kernel.org/stable/c/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f - Patch
References () https://git.kernel.org/stable/c/cea9d0015c140af39477dd5eeb9b20233a45daa9 - () https://git.kernel.org/stable/c/cea9d0015c140af39477dd5eeb9b20233a45daa9 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/075c0405b0d7d9fc490609e988a3af0069596538 - () https://git.kernel.org/stable/c/075c0405b0d7d9fc490609e988a3af0069596538 -
References () https://git.kernel.org/stable/c/c0ed9a711e3392d73e857faa031d8d349c0d70db - () https://git.kernel.org/stable/c/c0ed9a711e3392d73e857faa031d8d349c0d70db -
References () https://git.kernel.org/stable/c/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f - () https://git.kernel.org/stable/c/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f -
References () https://git.kernel.org/stable/c/cea9d0015c140af39477dd5eeb9b20233a45daa9 - () https://git.kernel.org/stable/c/cea9d0015c140af39477dd5eeb9b20233a45daa9 -

20 Jun 2024, 12:43

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: openrisc: trampas: no envía señales a subprocesos en modo kernel. El manejo de excepciones de OpenRISC envía señales a los procesos del usuario sobre excepciones de punto flotante e instrucciones de captura (para depuración), entre otros. Hay un error en el que la lógica de manejo de trampas puede enviar señales a los subprocesos del kernel. No debemos enviar estas señales a los subprocesos del kernel; si eso sucede, lo tratamos como un error. Este parche agrega condiciones para morir si el kernel recibe estas excepciones en el código del modo kernel.

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2025-10-03 15:26


NVD link : CVE-2024-38614

Mitre link : CVE-2024-38614

CVE.ORG link : CVE-2024-38614


JSON object : View

Products Affected

linux

  • linux_kernel