CVE-2024-36965

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/06/2024
Last modified:
17/07/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> remoteproc: mediatek: Make sure IPI buffer fits in L2TCM<br /> <br /> The IPI buffer location is read from the firmware that we load to the<br /> System Companion Processor, and it&amp;#39;s not granted that both the SRAM<br /> (L2TCM) size that is defined in the devicetree node is large enough<br /> for that, and while this is especially true for multi-core SCP, it&amp;#39;s<br /> still useful to check on single-core variants as well.<br /> <br /> Failing to perform this check may make this driver perform R/W<br /> operations out of the L2TCM boundary, resulting (at best) in a<br /> kernel panic.<br /> <br /> To fix that, check that the IPI buffer fits, otherwise return a<br /> failure and refuse to boot the relevant SCP core (or the SCP at<br /> all, if this is single core).

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.160 (including)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.92 (including)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.32 (including)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.11 (including)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.2 (including)