Release Date: | 2024-07-29 |
In the Linux kernel, the following vulnerability has been resolved:\npowerpc/pseries: Whitelist dtl slub object for copying to userspace\nReading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*\nresults in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as\nshown below.\nkernel BUG at mm/usercopy.c:102!\nOops: Exception in kernel mode, sig: 5 [#1]\nLE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries\nModules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc\nscsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse\nCPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85\nHardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries\nNIP: c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8\nREGS: c000000120c078c0 TRAP: 0700 Not tainted (6.10.0-rc3)\nMSR: 8000000000029033
See more information about CVE-2024-41065 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.
Base Score: | 4.4 | CVSS Vector: | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
Attack Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | High | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 7 (kernel-uek) | ELSA-2024-12780 | 2024-10-11 |
Oracle Linux version 7 (kernel-uek) | ELSA-2024-12782 | 2024-10-14 |
Oracle Linux version 8 (kernel) | ELSA-2024-7000 | 2024-09-24 |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12780 | 2024-10-11 |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12782 | 2024-10-14 |
Oracle Linux version 8 (kernel-uek) | ELSA-2024-12815 | 2024-11-11 |
Oracle Linux version 9 (kernel) | ELSA-2024-9315 | 2024-11-14 |
Oracle Linux version 9 (kernel-uek) | ELSA-2024-12815 | 2024-11-11 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: