CVE-2024-43868 (GCVE-0-2024-43868)

Vulnerability from cvelistv5 – Published: 2024-08-20 23:50 – Updated: 2025-11-03 22:06
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved: riscv/purgatory: align riscv_kernel_entry When alignment handling is delegated to the kernel, everything must be word-aligned in purgatory, since the trap handler is then set to the kexec one. Without the alignment, hitting the exception would ultimately crash. On other occasions, the kernel's handler would take care of exceptions. This has been tested on a JH7110 SoC with oreboot and its SBI delegating unaligned access exceptions and the kernel configured to handle them.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 736e30af583fb6e0e2b8211b894ff99dea0f1ee7 , < 10ffafb456f293976c42f700578ef740467cb569 (git)
Affected: 736e30af583fb6e0e2b8211b894ff99dea0f1ee7 , < 6e62dab357eea12db0fc62dea94c7a892888e6e8 (git)
Affected: 736e30af583fb6e0e2b8211b894ff99dea0f1ee7 , < 5d4aaf16a8255f7c71790e211724ba029609c5ff (git)
Affected: 736e30af583fb6e0e2b8211b894ff99dea0f1ee7 , < fb197c5d2fd24b9af3d4697d0cf778645846d6d5 (git)
Create a notification for this product.
    Linux Linux Affected: 5.19
Unaffected: 0 , < 5.19 (semver)
Unaffected: 6.1.117 , ≤ 6.1.* (semver)
Unaffected: 6.6.61 , ≤ 6.6.* (semver)
Unaffected: 6.10.4 , ≤ 6.10.* (semver)
Unaffected: 6.11 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-43868",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:06:29.530813Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:33:18.989Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T22:06:15.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "arch/riscv/purgatory/entry.S"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "10ffafb456f293976c42f700578ef740467cb569",
              "status": "affected",
              "version": "736e30af583fb6e0e2b8211b894ff99dea0f1ee7",
              "versionType": "git"
            },
            {
              "lessThan": "6e62dab357eea12db0fc62dea94c7a892888e6e8",
              "status": "affected",
              "version": "736e30af583fb6e0e2b8211b894ff99dea0f1ee7",
              "versionType": "git"
            },
            {
              "lessThan": "5d4aaf16a8255f7c71790e211724ba029609c5ff",
              "status": "affected",
              "version": "736e30af583fb6e0e2b8211b894ff99dea0f1ee7",
              "versionType": "git"
            },
            {
              "lessThan": "fb197c5d2fd24b9af3d4697d0cf778645846d6d5",
              "status": "affected",
              "version": "736e30af583fb6e0e2b8211b894ff99dea0f1ee7",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "arch/riscv/purgatory/entry.S"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.19"
            },
            {
              "lessThan": "5.19",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.117",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.61",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.11",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.117",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.61",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10.4",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.11",
                  "versionStartIncluding": "5.19",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv/purgatory: align riscv_kernel_entry\n\nWhen alignment handling is delegated to the kernel, everything must be\nword-aligned in purgatory, since the trap handler is then set to the\nkexec one. Without the alignment, hitting the exception would\nultimately crash. On other occasions, the kernel\u0027s handler would take\ncare of exceptions.\nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating\nunaligned access exceptions and the kernel configured to handle them."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:28:04.830Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/10ffafb456f293976c42f700578ef740467cb569"
        },
        {
          "url": "https://git.kernel.org/stable/c/6e62dab357eea12db0fc62dea94c7a892888e6e8"
        },
        {
          "url": "https://git.kernel.org/stable/c/5d4aaf16a8255f7c71790e211724ba029609c5ff"
        },
        {
          "url": "https://git.kernel.org/stable/c/fb197c5d2fd24b9af3d4697d0cf778645846d6d5"
        }
      ],
      "title": "riscv/purgatory: align riscv_kernel_entry",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-43868",
    "datePublished": "2024-08-20T23:50:51.464Z",
    "dateReserved": "2024-08-17T09:11:59.280Z",
    "dateUpdated": "2025-11-03T22:06:15.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nriscv/purgatory: align riscv_kernel_entry\\n\\nWhen alignment handling is delegated to the kernel, everything must be\\nword-aligned in purgatory, since the trap handler is then set to the\\nkexec one. Without the alignment, hitting the exception would\\nultimately crash. On other occasions, the kernel\u0027s handler would take\\ncare of exceptions.\\nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating\\nunaligned access exceptions and the kernel configured to handle them.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv/purgatory: align riscv_kernel_entry Cuando el manejo de la alineaci\\u00f3n se delega al kernel, todo debe estar alineado por palabras en el purgatorio, ya que el controlador de trampas se establece en kexec. Sin la alineaci\\u00f3n, alcanzar la excepci\\u00f3n finalmente fallar\\u00eda. En otras ocasiones, el controlador del kernel se encargar\\u00eda de las excepciones. Esto se prob\\u00f3 en un SoC JH7110 con oreboot y su SBI que delegaba excepciones de acceso no alineadas y el kernel configurado para manejarlas.\"}]",
      "id": "CVE-2024-43868",
      "lastModified": "2024-11-14T16:15:19.803",
      "published": "2024-08-21T00:15:05.150",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/10ffafb456f293976c42f700578ef740467cb569\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/5d4aaf16a8255f7c71790e211724ba029609c5ff\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/6e62dab357eea12db0fc62dea94c7a892888e6e8\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/fb197c5d2fd24b9af3d4697d0cf778645846d6d5\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-43868\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-21T00:15:05.150\",\"lastModified\":\"2025-11-03T22:18:14.253\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nriscv/purgatory: align riscv_kernel_entry\\n\\nWhen alignment handling is delegated to the kernel, everything must be\\nword-aligned in purgatory, since the trap handler is then set to the\\nkexec one. Without the alignment, hitting the exception would\\nultimately crash. On other occasions, the kernel\u0027s handler would take\\ncare of exceptions.\\nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating\\nunaligned access exceptions and the kernel configured to handle them.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv/purgatory: align riscv_kernel_entry Cuando el manejo de la alineaci\u00f3n se delega al kernel, todo debe estar alineado por palabras en el purgatorio, ya que el controlador de trampas se establece en kexec. Sin la alineaci\u00f3n, alcanzar la excepci\u00f3n finalmente fallar\u00eda. En otras ocasiones, el controlador del kernel se encargar\u00eda de las excepciones. Esto se prob\u00f3 en un SoC JH7110 con oreboot y su SBI que delegaba excepciones de acceso no alineadas y el kernel configurado para manejarlas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.19\",\"versionEndExcluding\":\"6.1.117\",\"matchCriteriaId\":\"4EC66B81-4788-4052-A9B4-B9249FCF4427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.61\",\"matchCriteriaId\":\"630ED7EB-C97E-4435-B884-1E309E40D6F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.4\",\"matchCriteriaId\":\"1F9FECDC-6CB8-41E5-B32A-E46776100D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/10ffafb456f293976c42f700578ef740467cb569\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5d4aaf16a8255f7c71790e211724ba029609c5ff\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/6e62dab357eea12db0fc62dea94c7a892888e6e8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/fb197c5d2fd24b9af3d4697d0cf778645846d6d5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-43868\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:06:29.530813Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:22.729Z\"}}], \"cna\": {\"title\": \"riscv/purgatory: align riscv_kernel_entry\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"736e30af583f\", \"lessThan\": \"10ffafb456f2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"736e30af583f\", \"lessThan\": \"6e62dab357ee\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"736e30af583f\", \"lessThan\": \"5d4aaf16a825\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"736e30af583f\", \"lessThan\": \"fb197c5d2fd2\", \"versionType\": \"git\"}], \"programFiles\": [\"arch/riscv/purgatory/entry.S\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.19\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.19\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.1.117\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.61\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"arch/riscv/purgatory/entry.S\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/10ffafb456f293976c42f700578ef740467cb569\"}, {\"url\": \"https://git.kernel.org/stable/c/6e62dab357eea12db0fc62dea94c7a892888e6e8\"}, {\"url\": \"https://git.kernel.org/stable/c/5d4aaf16a8255f7c71790e211724ba029609c5ff\"}, {\"url\": \"https://git.kernel.org/stable/c/fb197c5d2fd24b9af3d4697d0cf778645846d6d5\"}], \"x_generator\": {\"engine\": \"bippy-8e903de6a542\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nriscv/purgatory: align riscv_kernel_entry\\n\\nWhen alignment handling is delegated to the kernel, everything must be\\nword-aligned in purgatory, since the trap handler is then set to the\\nkexec one. Without the alignment, hitting the exception would\\nultimately crash. On other occasions, the kernel\u0027s handler would take\\ncare of exceptions.\\nThis has been tested on a JH7110 SoC with oreboot and its SBI delegating\\nunaligned access exceptions and the kernel configured to handle them.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-11-14T15:45:12.573Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-43868\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-14T15:45:12.573Z\", \"dateReserved\": \"2024-08-17T09:11:59.280Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-08-20T23:50:51.464Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…