CVE-2024-43868

In the Linux kernel, the following vulnerability has been resolved: riscv/purgatory: align riscv_kernel_entry When alignment handling is delegated to the kernel, everything must be word-aligned in purgatory, since the trap handler is then set to the kexec one. Without the alignment, hitting the exception would ultimately crash. On other occasions, the kernel's handler would take care of exceptions. This has been tested on a JH7110 SoC with oreboot and its SBI delegating unaligned access exceptions and the kernel configured to handle them.
CVSS

No CVSS.

Configurations

No configuration.

History

14 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/10ffafb456f293976c42f700578ef740467cb569 -
  • () https://git.kernel.org/stable/c/6e62dab357eea12db0fc62dea94c7a892888e6e8 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv/purgatory: align riscv_kernel_entry Cuando el manejo de la alineación se delega al kernel, todo debe estar alineado por palabras en el purgatorio, ya que el controlador de trampas se establece en kexec. Sin la alineación, alcanzar la excepción finalmente fallaría. En otras ocasiones, el controlador del kernel se encargaría de las excepciones. Esto se probó en un SoC JH7110 con oreboot y su SBI que delegaba excepciones de acceso no alineadas y el kernel configurado para manejarlas.

21 Aug 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-21 00:15

Updated : 2024-11-14 16:15


NVD link : CVE-2024-43868

Mitre link : CVE-2024-43868

CVE.ORG link : CVE-2024-43868


JSON object : View

Products Affected

No product.

CWE

No CWE.