In the Linux kernel, the following vulnerability has been resolved: remoteproc: mediatek: Make sure IPI buffer fits in L2TCM The IPI buffer location is read from the firmware that we load to the System Companion Processor, and it's not granted that both the SRAM (L2TCM) size that is defined in the devicetree node is large enough for that, and while this is especially true for multi-core SCP, it's still useful to check on single-core variants as well. Failing to perform this check may make this driver perform R/W operations out of the L2TCM boundary, resulting (at best) in a kernel panic. To fix that, check that the IPI buffer fits, otherwise return a failure and refuse to boot the relevant SCP core (or the SCP at all, if this is single core).
History

Wed, 11 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-06-08T12:52:58.404Z

Updated: 2024-09-11T17:34:58.958Z

Reserved: 2024-05-30T15:25:07.081Z

Link: CVE-2024-36965

cve-icon Vulnrichment

Updated: 2024-08-02T03:43:50.595Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-08T13:15:57.820

Modified: 2024-07-17T17:32:46.323

Link: CVE-2024-36965

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-06-08T00:00:00Z

Links: CVE-2024-36965 - Bugzilla