Advisory Published
Updated

CVE-2024-50017: x86/mm/ident_map: Use gbpages only where full GB page should be mapped.

First published: Mon Oct 21 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: x86/mm/ident_map: Use gbpages only where full GB page should be mapped. When ident_pud_init() uses only GB pages to create identity maps, large ranges of addresses not actually requested can be included in the resulting table; a 4K request will map a full GB. This can include a lot of extra address space past that requested, including areas marked reserved by the BIOS. That allows processor speculation into reserved regions, that on UV systems can cause system halts. Only use GB pages when map creation requests include the full GB page of space. Fall back to using smaller 2M pages when only portions of a GB page are included in the request. No attempt is made to coalesce mapping requests. If a request requires a map entry at the 2M (pmd) level, subsequent mapping requests within the same 1G region will also be at the pmd level, even if adjacent or overlapping such requests could have been combined to map a full GB page. Existing usage starts with larger regions and then adds smaller regions, so this should not have any great consequence.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
Linux Kernel<6.10.14
Linux Kernel>=6.11<6.11.3
debian/linux<=5.10.223-1<=5.10.226-1<=6.1.123-1<=6.1.128-1
6.12.12-1
6.12.15-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-50017?

    CVE-2024-50017 has a medium severity rating due to its impact on memory mapping in the Linux kernel.

  • How do I fix CVE-2024-50017?

    To fix CVE-2024-50017, upgrade your Linux kernel to version 6.10.14 or later, or 6.11.3 or later.

  • What systems are affected by CVE-2024-50017?

    CVE-2024-50017 affects versions of the Linux kernel prior to 6.10.14 and from 6.11.0 to 6.11.3.

  • What is the impact of CVE-2024-50017?

    The impact of CVE-2024-50017 includes potential vulnerabilities in memory management, which could lead to instability or unnecessary memory usage.

  • When was CVE-2024-50017 published?

    CVE-2024-50017 was published in 2024 as part of ongoing security improvements in the Linux kernel.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203