CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
Low
EPSS
Percentile
9.5%
In the Linux kernel, the following vulnerability has been resolved:
spi: don’t unoptimize message in spi_async()
Calling spi_maybe_unoptimize_message() in spi_async() is wrong because
the message is likely to be in the queue and not transferred yet. This
can corrupt the message while it is being used by the controller driver.
spi_maybe_unoptimize_message() is already called in the correct place
in spi_finalize_current_message() to balance the call to
spi_maybe_optimize_message() in spi_async().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux-bluefield | < any | UNKNOWN |
git.kernel.org/linus/c86a918b1bdba78fb155184f8d88dfba1e63335d (6.10)
git.kernel.org/stable/c/8b9af6d67517ce4a0015928b3cf35bfd2b1bc1c2
git.kernel.org/stable/c/c86a918b1bdba78fb155184f8d88dfba1e63335d
launchpad.net/bugs/cve/CVE-2024-42249
nvd.nist.gov/vuln/detail/CVE-2024-42249
security-tracker.debian.org/tracker/CVE-2024-42249
www.cve.org/CVERecord?id=CVE-2024-42249