Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2024-43868— riscv/purgatory: align riscv_kernel_entry

EPSS 0.04% · P11

Affected Version Matrix 10

VendorProductVersion RangeStatus
LinuxLinux736e30af583fb6e0e2b8211b894ff99dea0f1ee7< 10ffafb456f293976c42f700578ef740467cb569affected
736e30af583fb6e0e2b8211b894ff99dea0f1ee7< 6e62dab357eea12db0fc62dea94c7a892888e6e8affected
736e30af583fb6e0e2b8211b894ff99dea0f1ee7< 5d4aaf16a8255f7c71790e211724ba029609c5ffaffected
736e30af583fb6e0e2b8211b894ff99dea0f1ee7< fb197c5d2fd24b9af3d4697d0cf778645846d6d5affected
5.19affected
< 5.19unaffected
6.1.117≤ 6.1.*unaffected
6.6.61≤ 6.6.*unaffected
… +2 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-43868

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
riscv/purgatory: align riscv_kernel_entry
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: riscv/purgatory: align riscv_kernel_entry When alignment handling is delegated to the kernel, everything must be word-aligned in purgatory, since the trap handler is then set to the kexec one. Without the alignment, hitting the exception would ultimately crash. On other occasions, the kernel's handler would take care of exceptions. This has been tested on a JH7110 SoC with oreboot and its SBI delegating unaligned access exceptions and the kernel configured to handle them.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞。攻击者利用该漏洞导致内核崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 736e30af583fb6e0e2b8211b894ff99dea0f1ee7 ~ 10ffafb456f293976c42f700578ef740467cb569 -
LinuxLinux 5.19 -

II. Public POCs for CVE-2024-43868

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-43868

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-08-20 · 8 CVEs total

CVE-2024-43861net: usb: qmi_wwan: fix memory leak for not ip packets
CVE-2024-43862net: wan: fsl_qmc_hdlc: Convert carrier_lock spinlock to a mutex
CVE-2024-43863drm/vmwgfx: Fix a deadlock in dma buf fence polling
CVE-2024-43864net/mlx5e: Fix CT entry update leaks of modify header context
CVE-2024-43865s390/fpu: Re-add exception handling in load_fpu_state()
CVE-2024-43866net/mlx5: Always drain health in shutdown callback
CVE-2024-43867drm/nouveau: prime: fix refcount underflow

IV. Related Vulnerabilities

V. Comments for CVE-2024-43868

No comments yet


Leave a comment