CVE-2024-41027
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Fix userfaultfd_api to return EINVAL as expected<br />
<br />
Currently if we request a feature that is not set in the Kernel config we<br />
fail silently and return all the available features. However, the man<br />
page indicates we should return an EINVAL.<br />
<br />
We need to fix this issue since we can end up with a Kernel warning should<br />
a program request the feature UFFD_FEATURE_WP_UNPOPULATED on a kernel with<br />
the config not set with this feature.<br />
<br />
[ 200.812896] WARNING: CPU: 91 PID: 13634 at mm/memory.c:1660 zap_pte_range+0x43d/0x660<br />
[ 200.820738] Modules linked in:<br />
[ 200.869387] CPU: 91 PID: 13634 Comm: userfaultfd Kdump: loaded Not tainted 6.9.0-rc5+ #8<br />
[ 200.877477] Hardware name: Dell Inc. PowerEdge R6525/0N7YGH, BIOS 2.7.3 03/30/2022<br />
[ 200.885052] RIP: 0010:zap_pte_range+0x43d/0x660
Impact
Base Score 3.x
3.30
Severity 3.x
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 5.15.163 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.100 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.41 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/14875fd5f9bcf60ac5518c63bfb676ade44aa7c6
- https://git.kernel.org/stable/c/1723f04caacb32cadc4e063725d836a0c4450694
- https://git.kernel.org/stable/c/519547760f16eae7803d2658d9524bc5ba7a20a7
- https://git.kernel.org/stable/c/8111f902b7c95d75fc80c7e577f5045886c6b384
- https://git.kernel.org/stable/c/cd94cac4069a763ab5206be2c64c9a8beae590ba
- https://git.kernel.org/stable/c/14875fd5f9bcf60ac5518c63bfb676ade44aa7c6
- https://git.kernel.org/stable/c/1723f04caacb32cadc4e063725d836a0c4450694
- https://git.kernel.org/stable/c/519547760f16eae7803d2658d9524bc5ba7a20a7
- https://git.kernel.org/stable/c/8111f902b7c95d75fc80c7e577f5045886c6b384
- https://git.kernel.org/stable/c/cd94cac4069a763ab5206be2c64c9a8beae590ba
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



