CVE-2024-40963

In the Linux kernel, the following vulnerability has been resolved: mips: bmips: BCM6358: make sure CBR is correctly set It was discovered that some device have CBR address set to 0 causing kernel panic when arch_sync_dma_for_cpu_all is called. This was notice in situation where the system is booted from TP1 and BMIPS_GET_CBR() returns 0 instead of a valid address and !!(read_c0_brcm_cmt_local() & (1 << 31)); not failing. The current check whether RAC flush should be disabled or not are not enough hence lets check if CBR is a valid address or not.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*

History

17 Sep 2025, 15:11

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.3:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc6:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-754
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/10afe5f7d30f6fe50c2b1177549d0e04921fc373 - () https://git.kernel.org/stable/c/10afe5f7d30f6fe50c2b1177549d0e04921fc373 - Patch
References () https://git.kernel.org/stable/c/2cd4854ef14a487bcfb76c7980675980cad27b52 - () https://git.kernel.org/stable/c/2cd4854ef14a487bcfb76c7980675980cad27b52 - Patch
References () https://git.kernel.org/stable/c/36d771ce6028b886e18a4a8956a5d23688e4e13d - () https://git.kernel.org/stable/c/36d771ce6028b886e18a4a8956a5d23688e4e13d - Patch
References () https://git.kernel.org/stable/c/6c0f6ccd939166f56a904c792d7fcadae43b9085 - () https://git.kernel.org/stable/c/6c0f6ccd939166f56a904c792d7fcadae43b9085 - Patch
References () https://git.kernel.org/stable/c/89167072fd249e5f23ae2f8093f87da5925cef27 - () https://git.kernel.org/stable/c/89167072fd249e5f23ae2f8093f87da5925cef27 - Patch
References () https://git.kernel.org/stable/c/ce5cdd3b05216b704a704f466fb4c2dff3778caf - () https://git.kernel.org/stable/c/ce5cdd3b05216b704a704f466fb4c2dff3778caf - Patch
References () https://git.kernel.org/stable/c/da895fd6da438af8d9326b8f02d715a9c76c3b5b - () https://git.kernel.org/stable/c/da895fd6da438af8d9326b8f02d715a9c76c3b5b - Patch

21 Nov 2024, 09:31

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: mips: bmips: BCM6358: asegúrese de que CBR esté configurado correctamente. Se descubrió que algunos dispositivos tienen la dirección CBR configurada en 0, lo que provoca pánico en el kernel cuando se llama a arch_sync_dma_for_cpu_all. Esto se notó en una situación en la que el sistema se inicia desde TP1 y BMIPS_GET_CBR() devuelve 0 en lugar de una dirección válida y !!(read_c0_brcm_cmt_local() &amp; (1 &lt;&lt; 31)); no fallar. La verificación actual de si la descarga de RAC debe desactivarse o no no es suficiente, por lo tanto, verifiquemos si CBR es una dirección válida o no.
References () https://git.kernel.org/stable/c/10afe5f7d30f6fe50c2b1177549d0e04921fc373 - () https://git.kernel.org/stable/c/10afe5f7d30f6fe50c2b1177549d0e04921fc373 -
References () https://git.kernel.org/stable/c/2cd4854ef14a487bcfb76c7980675980cad27b52 - () https://git.kernel.org/stable/c/2cd4854ef14a487bcfb76c7980675980cad27b52 -
References () https://git.kernel.org/stable/c/36d771ce6028b886e18a4a8956a5d23688e4e13d - () https://git.kernel.org/stable/c/36d771ce6028b886e18a4a8956a5d23688e4e13d -
References () https://git.kernel.org/stable/c/6c0f6ccd939166f56a904c792d7fcadae43b9085 - () https://git.kernel.org/stable/c/6c0f6ccd939166f56a904c792d7fcadae43b9085 -
References () https://git.kernel.org/stable/c/89167072fd249e5f23ae2f8093f87da5925cef27 - () https://git.kernel.org/stable/c/89167072fd249e5f23ae2f8093f87da5925cef27 -
References () https://git.kernel.org/stable/c/ce5cdd3b05216b704a704f466fb4c2dff3778caf - () https://git.kernel.org/stable/c/ce5cdd3b05216b704a704f466fb4c2dff3778caf -
References () https://git.kernel.org/stable/c/da895fd6da438af8d9326b8f02d715a9c76c3b5b - () https://git.kernel.org/stable/c/da895fd6da438af8d9326b8f02d715a9c76c3b5b -

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 15:11


NVD link : CVE-2024-40963

Mitre link : CVE-2024-40963

CVE.ORG link : CVE-2024-40963


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions