SB2024090575 - Improper neutralization of directives in statically saved code (\'static code injection\') in Linux kernel parisc



SB2024090575 - Improper neutralization of directives in statically saved code (\'static code injection\') in Linux kernel parisc

Published: September 5, 2024 Updated: May 12, 2025

Security Bulletin ID SB2024090575
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper neutralization of directives in statically saved code (\'static code injection\') (CVE-ID: CVE-2024-44949)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

In the Linux kernel, the following vulnerability has been resolved: parisc: fix a possible DMA corruption ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be possible that 2 unrelated 16-byte allocations share a cache line. If 1 of these allocations is written using DMA and the other is written using cached write, the value that was written with DMA may be corrupted. This commit changes ARCH_DMA_MINALIGN to be 128 on PA20 and 32 on PA1.1 - that is the largest possible cache line size. As different parisc microarchitectures have different cache line size, we define arch_slab_minalign(), cache_line_size() and dma_get_cache_alignment() so that the kernel may tune slab cache parameters dynamically, based on the detected cache line size.


Remediation

Install update from vendor's website.