U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!

CVE-2024-40963 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: mips: bmips: BCM6358: make sure CBR is correctly set It was discovered that some device have CBR address set to 0 causing kernel panic when arch_sync_dma_for_cpu_all is called. This was notice in situation where the system is booted from TP1 and BMIPS_GET_CBR() returns 0 instead of a valid address and !!(read_c0_brcm_cmt_local() & (1 << 31)); not failing. The current check whether RAC flush should be disabled or not are not enough hence lets check if CBR is a valid address or not.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/10afe5f7d30f6fe50c2b1177549d0e04921fc373
https://git.kernel.org/stable/c/2cd4854ef14a487bcfb76c7980675980cad27b52
https://git.kernel.org/stable/c/36d771ce6028b886e18a4a8956a5d23688e4e13d
https://git.kernel.org/stable/c/6c0f6ccd939166f56a904c792d7fcadae43b9085
https://git.kernel.org/stable/c/89167072fd249e5f23ae2f8093f87da5925cef27
https://git.kernel.org/stable/c/ce5cdd3b05216b704a704f466fb4c2dff3778caf
https://git.kernel.org/stable/c/da895fd6da438af8d9326b8f02d715a9c76c3b5b

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-40963
NVD Published Date:
07/12/2024
NVD Last Modified:
07/12/2024
Source:
kernel.org