CVE-2024-35996
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
20/05/2024
Last modified:
17/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
cpu: Re-enable CPU mitigations by default for !X86 architectures<br />
<br />
Rename x86&#39;s to CPU_MITIGATIONS, define it in generic code, and force it<br />
on for all architectures exception x86. A recent commit to turn<br />
mitigations off by default if SPECULATION_MITIGATIONS=n kinda sorta<br />
missed that "cpu_mitigations" is completely generic, whereas<br />
SPECULATION_MITIGATIONS is x86-specific.<br />
<br />
Rename x86&#39;s SPECULATIVE_MITIGATIONS instead of keeping both and have it<br />
select CPU_MITIGATIONS, as having two configs for the same thing is<br />
unnecessary and confusing. This will also allow x86 to use the knob to<br />
manage mitigations that aren&#39;t strictly related to speculative<br />
execution.<br />
<br />
Use another Kconfig to communicate to common code that CPU_MITIGATIONS<br />
is already defined instead of having x86&#39;s menu depend on the common<br />
CPU_MITIGATIONS. This allows keeping a single point of contact for all<br />
of x86&#39;s mitigations, and it&#39;s not clear that other architectures *want*<br />
to allow disabling mitigations at compile-time.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.156 (including) | 5.15.158 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.87 (including) | 6.1.90 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.28 (including) | 6.6.30 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8.7 (including) | 6.8.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/36b32816fbab267611f073223f1b0b816ec5920f
- https://git.kernel.org/stable/c/38f17d1fbb5bfb56ca1419e2d06376d57a9396f9
- https://git.kernel.org/stable/c/8292f4f8dd1b005d0688d726261004f816ef730a
- https://git.kernel.org/stable/c/af6d6a923b40bf6471e44067ac61cc5814b48e7f
- https://git.kernel.org/stable/c/fd8547ebc187037cc69441a15c1441aeaab80f49
- https://git.kernel.org/stable/c/fe42754b94a42d08cf9501790afc25c4f6a5f631
- https://git.kernel.org/stable/c/36b32816fbab267611f073223f1b0b816ec5920f
- https://git.kernel.org/stable/c/38f17d1fbb5bfb56ca1419e2d06376d57a9396f9
- https://git.kernel.org/stable/c/8292f4f8dd1b005d0688d726261004f816ef730a
- https://git.kernel.org/stable/c/af6d6a923b40bf6471e44067ac61cc5814b48e7f
- https://git.kernel.org/stable/c/fd8547ebc187037cc69441a15c1441aeaab80f49
- https://git.kernel.org/stable/c/fe42754b94a42d08cf9501790afc25c4f6a5f631
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html



