Lucene search

K
cveLinuxCVE-2024-43860
HistoryAug 17, 2024 - 10:15 a.m.

CVE-2024-43860

2024-08-1710:15:10
CWE-476
Linux
web.nvd.nist.gov
30
remoteproc vulnerability resolved
imx_rproc
memory region
of_count_phandle_with_args
of_parse_phandle
svace
linux verification center

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

remoteproc: imx_rproc: Skip over memory region when node value is NULL

In imx_rproc_addr_init() “nph = of_count_phandle_with_args()” just counts
number of phandles. But phandles may be empty. So of_parse_phandle() in
the parsing loop (0 < a < nph) may return NULL which is later dereferenced.
Adjust this issue by adding NULL-return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[Fixed title to fit within the prescribed 70-75 charcters]

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange4.144.19.320
OR
linuxlinux_kernelRange4.205.4.282
OR
linuxlinux_kernelRange5.55.10.224
OR
linuxlinux_kernelRange5.115.15.165
OR
linuxlinux_kernelRange5.166.1.103
OR
linuxlinux_kernelRange6.26.6.44
OR
linuxlinux_kernelRange6.76.10.3
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/remoteproc/imx_rproc.c"
    ],
    "versions": [
      {
        "version": "a0ff4aa6f010",
        "lessThan": "6884fd0283e0",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a0ff4aa6f010",
        "lessThan": "84beb7738459",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a0ff4aa6f010",
        "lessThan": "6b50462b473f",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a0ff4aa6f010",
        "lessThan": "4e13b7c23988",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a0ff4aa6f010",
        "lessThan": "9a17cf8b2ce4",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a0ff4aa6f010",
        "lessThan": "6c9ea3547fad",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a0ff4aa6f010",
        "lessThan": "c877a5f5268d",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "a0ff4aa6f010",
        "lessThan": "2fa26ca8b786",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/remoteproc/imx_rproc.c"
    ],
    "versions": [
      {
        "version": "4.14",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "4.14",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.320",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.282",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.224",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.165",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.103",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.44",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10.3",
        "lessThanOrEqual": "6.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.11",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

5.0%