Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-46822— arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry

EPSS 0.01% · P1

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinux0be7320a635c2e434e8b67e0e9474a85ceb421c4< f57769ff6fa7f97f1296965f20e8a2bb3ee9fd0faffected
0be7320a635c2e434e8b67e0e9474a85ceb421c4< 4c3b21204abb4fa3ab310fbbb5cf7f0e85f3a1bcaffected
0be7320a635c2e434e8b67e0e9474a85ceb421c4< 945be49f4e832a9184c313fdf8917475438a795baffected
0be7320a635c2e434e8b67e0e9474a85ceb421c4< 40cae0df42e5e7f7a1c0f32deed9c4027c1ba94eaffected
0be7320a635c2e434e8b67e0e9474a85ceb421c4< 62ca6d3a905b4c40cd942f3cc645a6718f8bc7e7affected
0be7320a635c2e434e8b67e0e9474a85ceb421c4< bc7fbb37e3d2df59336eadbd6a56be632e3c7df7affected
0be7320a635c2e434e8b67e0e9474a85ceb421c4< 2488444274c70038eb6b686cba5f1ce48ebb9cddaffected
3.7affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-46822

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry In a review discussion of the changes to support vCPU hotplug where a check was added on the GICC being enabled if was online, it was noted that there is need to map back to the cpu and use that to index into a cpumask. As such, a valid ID is needed. If an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible for the entry in cpu_madt_gicc[cpu] == NULL. This function would then cause a NULL pointer dereference. Whilst a path to trigger this has not been established, harden this caller against the possibility.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于在获取ACPI ID对应的CPU时,未进行适当的检查。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 0be7320a635c2e434e8b67e0e9474a85ceb421c4 ~ f57769ff6fa7f97f1296965f20e8a2bb3ee9fd0f -
LinuxLinux 3.7 -

II. Public POCs for CVE-2024-46822

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-46822

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-09-27 · 66 CVEs total

CVE-2024-46846spi: rockchip: Resolve unbalanced runtime PM / system PM handling
CVE-2024-46865fou: fix initialization of grc
CVE-2024-46864x86/hyperv: fix kexec crash due to VP assist page corruption
CVE-2024-46863ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item
CVE-2024-46851drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct()
CVE-2024-46852dma-buf: heaps: Fix off-by-one in CMA heap fault handler
CVE-2024-46850drm/amd/display: Avoid race between dcn35_set_drr() and dc_state_destruct()
CVE-2024-46849ASoC: meson: axg-card: fix 'use-after-free'
CVE-2024-46848perf/x86/intel: Limit the period on Haswell
CVE-2024-46847mm: vmalloc: ensure vmap_block is initialised before adding to queue
CVE-2024-46853spi: nxp-fspi: fix the KASAN report out-of-bounds bug
CVE-2024-46844um: line: always fill *error_out in setup_one_line()
CVE-2024-46845tracing/timerlat: Only clear timer if a kthread exists
CVE-2024-46843scsi: ufs: core: Remove SCSI host only if added
CVE-2024-46841btrfs: don't BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc()
CVE-2024-46842scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info
CVE-2024-46840btrfs: clean up our handling of refs == 0 in snapshot delete
CVE-2024-46838userfaultfd: don't BUG_ON() if khugepaged yanks our page table
CVE-2024-46837drm/panthor: Restrict high priorities on group_create
CVE-2024-46835drm/amdgpu: Fix smatch static checker warning

Showing top 20 of 66 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-46822

No comments yet


Leave a comment