CVE-2024-53134

In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx93-blk-ctrl: correct remove path The check condition should be 'i < bc->onecell_data.num_domains', not 'bc->onecell_data.num_domains' which will make the look never finish and cause kernel panic. Also disable runtime to address "imx93-blk-ctrl 4ac10000.system-controller: Unbalanced pm_runtime_enable!"
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*

History

11 Dec 2024, 17:10

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/201fb9e164a1e4c5937de2cf58bcb0327c08664f - () https://git.kernel.org/stable/c/201fb9e164a1e4c5937de2cf58bcb0327c08664f - Patch
References () https://git.kernel.org/stable/c/8fc228ab5d38a026eae7183a5f74a4fac43d9b6a - () https://git.kernel.org/stable/c/8fc228ab5d38a026eae7183a5f74a4fac43d9b6a - Patch
References () https://git.kernel.org/stable/c/f7c7c5aa556378a2c8da72c1f7f238b6648f95fb - () https://git.kernel.org/stable/c/f7c7c5aa556378a2c8da72c1f7f238b6648f95fb - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pmdomain: imx93-blk-ctrl: ruta de eliminación correcta La condición de comprobación debe ser 'i &lt; bc-&gt;onecell_data.num_domains', no 'bc-&gt;onecell_data.num_domains', que hará que la búsqueda nunca finalice y provoque un pánico del kernel. También deshabilite el tiempo de ejecución para solucionar "imx93-blk-ctrl 4ac10000.system-controller: Unbalanced pm_runtime_enable!"
First Time Linux linux Kernel
Linux
CWE CWE-670
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2024-12-04 15:15

Updated : 2024-12-11 17:10


NVD link : CVE-2024-53134

Mitre link : CVE-2024-53134

CVE.ORG link : CVE-2024-53134


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-670

Always-Incorrect Control Flow Implementation