CVE-2024-36965Linux vulnerability

30 documents8 sources
Severity
5.5MEDIUMNVD
OSV6.5
EPSS
0.0%
top 94.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 8
Latest updateSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: remoteproc: mediatek: Make sure IPI buffer fits in L2TCM The IPI buffer location is read from the firmware that we load to the System Companion Processor, and it's not granted that both the SRAM (L2TCM) size that is defined in the devicetree node is large enough for that, and while this is especially true for multi-core SCP, it's still useful to check on single-core variants as well. Failing to perform this check may make thi

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

Patches

🔴Vulnerability Details

14
OSV
linux-xilinx-zynqmp vulnerabilities2024-09-18
OSV
linux-hwe-5.15 vulnerabilities2024-08-21
OSV
linux-oracle-5.15 vulnerabilities2024-08-13
OSV
linux-oracle vulnerabilities2024-08-13
OSV
linux-lowlatency, linux-raspi vulnerabilities2024-08-13

📋Vendor Advisories

14
Ubuntu
Linux kernel vulnerabilities2024-09-18
Ubuntu
Linux kernel (HWE) vulnerabilities2024-08-21
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-08-13
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-08-13
Ubuntu
Linux kernel vulnerabilities2024-08-13

💬Community

1
Bugzilla
CVE-2024-36965 kernel: remoteproc: mediatek: Make sure IPI buffer fits in L2TCM2024-06-14