CVE-2024-44948

In the Linux kernel, the following vulnerability has been resolved: x86/mtrr: Check if fixed MTRRs exist before saving them MTRRs have an obsolete fixed variant for fine grained caching control of the 640K-1MB region that uses separate MSRs. This fixed variant has a separate capability bit in the MTRR capability MSR. So far all x86 CPUs which support MTRR have this separate bit set, so it went unnoticed that mtrr_save_state() does not check the capability bit before accessing the fixed MTRR MSRs. Though on a CPU that does not support the fixed MTRR capability this results in a #GP. The #GP itself is harmless because the RDMSR fault is handled gracefully, but results in a WARN_ON(). Add the missing capability check to prevent this.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*

History

03 Nov 2025, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html -
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

09 Oct 2025, 18:22

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/06c1de44d378ec5439db17bf476507d68589bfe9 - () https://git.kernel.org/stable/c/06c1de44d378ec5439db17bf476507d68589bfe9 - Patch
References () https://git.kernel.org/stable/c/34f36e6ee5bd7eff8b2adcd9fcaef369f752d82e - () https://git.kernel.org/stable/c/34f36e6ee5bd7eff8b2adcd9fcaef369f752d82e - Patch
References () https://git.kernel.org/stable/c/388f1c954019f253a8383f7eb733f38d541e10b6 - () https://git.kernel.org/stable/c/388f1c954019f253a8383f7eb733f38d541e10b6 - Patch
References () https://git.kernel.org/stable/c/450b6b22acdaac67a18eaf5ed498421ffcf10051 - () https://git.kernel.org/stable/c/450b6b22acdaac67a18eaf5ed498421ffcf10051 - Patch
References () https://git.kernel.org/stable/c/8a90d3fc7c24608548d3a750671f9dac21d1a462 - () https://git.kernel.org/stable/c/8a90d3fc7c24608548d3a750671f9dac21d1a462 - Patch
References () https://git.kernel.org/stable/c/8aa79dfb216b865e96ff890bc4ea71650f9bc8d7 - () https://git.kernel.org/stable/c/8aa79dfb216b865e96ff890bc4ea71650f9bc8d7 - Patch
References () https://git.kernel.org/stable/c/919f18f961c03d6694aa726c514184f2311a4614 - () https://git.kernel.org/stable/c/919f18f961c03d6694aa726c514184f2311a4614 - Patch
References () https://git.kernel.org/stable/c/ca7d00c5656d1791e28369919e3e10febe9c3b16 - () https://git.kernel.org/stable/c/ca7d00c5656d1791e28369919e3e10febe9c3b16 - Patch
CWE NVD-CWE-noinfo

Information

Published : 2024-09-04 19:15

Updated : 2025-11-03 23:15


NVD link : CVE-2024-44948

Mitre link : CVE-2024-44948

CVE.ORG link : CVE-2024-44948


JSON object : View

Products Affected

linux

  • linux_kernel