In the Linux kernel, the following vulnerability has been resolved:
mips: bmips: BCM6358: make sure CBR is correctly set
It was discovered that some device have CBR address set to 0 causing kernel panic when archsyncdmaforcpu_all is called.
This was notice in situation where the system is booted from TP1 and BMIPSGETCBR() returns 0 instead of a valid address and !!(readc0brcmcmtlocal() & (1 << 31)); not failing.
The current check whether RAC flush should be disabled or not are not enough hence lets check if CBR is a valid address or not.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40963.json",
"cna_assigner": "Linux"
}[
{
"id": "CVE-2024-40963-02bbec79",
"signature_version": "v1",
"digest": {
"function_hash": "180657546597404570320576228754862850344",
"length": 122.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@89167072fd249e5f23ae2f8093f87da5925cef27",
"signature_type": "Function",
"target": {
"file": "arch/mips/bmips/setup.c",
"function": "bcm6358_quirks"
}
},
{
"id": "CVE-2024-40963-076232f5",
"signature_version": "v1",
"digest": {
"function_hash": "180657546597404570320576228754862850344",
"length": 122.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@da895fd6da438af8d9326b8f02d715a9c76c3b5b",
"signature_type": "Function",
"target": {
"file": "arch/mips/bmips/setup.c",
"function": "bcm6358_quirks"
}
},
{
"id": "CVE-2024-40963-1660a9ef",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126766009048854213049679840370356970774",
"185229051117507405344544318642213147674",
"116380387864261328090309754706946772169",
"300640815667058609830653343942430892061"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@89167072fd249e5f23ae2f8093f87da5925cef27",
"signature_type": "Line",
"target": {
"file": "arch/mips/bmips/setup.c"
}
},
{
"id": "CVE-2024-40963-295cb974",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126766009048854213049679840370356970774",
"185229051117507405344544318642213147674",
"116380387864261328090309754706946772169",
"300640815667058609830653343942430892061"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce5cdd3b05216b704a704f466fb4c2dff3778caf",
"signature_type": "Line",
"target": {
"file": "arch/mips/bmips/setup.c"
}
},
{
"id": "CVE-2024-40963-3ff95448",
"signature_version": "v1",
"digest": {
"function_hash": "180657546597404570320576228754862850344",
"length": 122.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36d771ce6028b886e18a4a8956a5d23688e4e13d",
"signature_type": "Function",
"target": {
"file": "arch/mips/bmips/setup.c",
"function": "bcm6358_quirks"
}
},
{
"id": "CVE-2024-40963-45333851",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126766009048854213049679840370356970774",
"185229051117507405344544318642213147674",
"116380387864261328090309754706946772169",
"300640815667058609830653343942430892061"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@da895fd6da438af8d9326b8f02d715a9c76c3b5b",
"signature_type": "Line",
"target": {
"file": "arch/mips/bmips/setup.c"
}
},
{
"id": "CVE-2024-40963-4d86d933",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126766009048854213049679840370356970774",
"185229051117507405344544318642213147674",
"116380387864261328090309754706946772169",
"300640815667058609830653343942430892061"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10afe5f7d30f6fe50c2b1177549d0e04921fc373",
"signature_type": "Line",
"target": {
"file": "arch/mips/bmips/setup.c"
}
},
{
"id": "CVE-2024-40963-70839fcc",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126766009048854213049679840370356970774",
"185229051117507405344544318642213147674",
"116380387864261328090309754706946772169",
"300640815667058609830653343942430892061"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2cd4854ef14a487bcfb76c7980675980cad27b52",
"signature_type": "Line",
"target": {
"file": "arch/mips/bmips/setup.c"
}
},
{
"id": "CVE-2024-40963-8b60b9e9",
"signature_version": "v1",
"digest": {
"function_hash": "180657546597404570320576228754862850344",
"length": 122.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@10afe5f7d30f6fe50c2b1177549d0e04921fc373",
"signature_type": "Function",
"target": {
"file": "arch/mips/bmips/setup.c",
"function": "bcm6358_quirks"
}
},
{
"id": "CVE-2024-40963-c6299bde",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"126766009048854213049679840370356970774",
"185229051117507405344544318642213147674",
"116380387864261328090309754706946772169",
"300640815667058609830653343942430892061"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@36d771ce6028b886e18a4a8956a5d23688e4e13d",
"signature_type": "Line",
"target": {
"file": "arch/mips/bmips/setup.c"
}
},
{
"id": "CVE-2024-40963-d8929899",
"signature_version": "v1",
"digest": {
"function_hash": "180657546597404570320576228754862850344",
"length": 122.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2cd4854ef14a487bcfb76c7980675980cad27b52",
"signature_type": "Function",
"target": {
"file": "arch/mips/bmips/setup.c",
"function": "bcm6358_quirks"
}
},
{
"id": "CVE-2024-40963-eb96444f",
"signature_version": "v1",
"digest": {
"function_hash": "180657546597404570320576228754862850344",
"length": 122.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ce5cdd3b05216b704a704f466fb4c2dff3778caf",
"signature_type": "Function",
"target": {
"file": "arch/mips/bmips/setup.c",
"function": "bcm6358_quirks"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-40963.json"