First published: Wed Dec 04 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ARM: fix cacheflush with PAN It seems that the cacheflush syscall got broken when PAN for LPAE was implemented. User access was not enabled around the cache maintenance instructions, causing them to fault.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.10<6.11.10 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
Linux Kernel | =6.12-rc5 | |
Linux Kernel | =6.12-rc6 | |
Linux Kernel | =6.12-rc7 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53137 has been classified with a low severity due to its specific impact on certain Linux kernel versions.
To fix CVE-2024-53137, update your Linux kernel to version 6.12 or newer, as well as any stable release that includes the patch.
Linux kernel versions from 6.10 up to 6.11.10, as well as 6.12-rc1 through 6.12-rc7, are affected by CVE-2024-53137.
CVE-2024-53137 does not present a remote attack vector and primarily impacts local user operations.
Users running affected Linux kernel versions may experience faults during cache maintenance operations, potentially impacting system performance.