PT-2024-33944 · Linux +3 · Linux Kernel +3

Binbin Zhou

·

Published

2024-11-05

·

Updated

2025-05-26

·

CVE-2024-50111

CVSS v3.1
5.5
VectorAV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Name of the Vulnerable Software and Affected Versions:

Linux kernel versions prior to 6.6.61

Description:

The issue is related to the Linux kernel, specifically the LoongArch architecture, where an unaligned access exception can be triggered in an irq-enabled context, such as user mode. This can cause the `do ale()` function to call `get user()`, which may lead to a sleep, resulting in a BUG message indicating a sleeping function called from an invalid context. The estimated number of potentially affected devices is not provided. There is no information about real-world incidents where this issue was exploited.

Recommendations:

To resolve the issue, update to Linux kernel version 6.6.61 or later. As a temporary workaround, consider disabling the `do ale()` function until a patch is available. However, this may have unintended consequences and should be approached with caution. At the moment, there is no other information about additional mitigation measures.

Fix

Related Identifiers

CVE-2024-50111
ECHO-8D74-308A-5CE5
MGASA-2024-0368
MGASA-2024-0369
OESA-2025-1097
OPENSUSE-SU-2024:14500-1
OPENSUSE-SU-2025:14705-1
USN-7276-1
USN-7277-1
USN-7310-1
USN-7449-1
USN-7449-2
USN-7450-1
USN-7451-1
USN-7452-1
USN-7453-1
USN-7468-1
USN-7523-1
USN-7524-1

Affected Products

Debian
Linuxmint
Linux Kernel
Ubuntu