cve-2024-35920
Vulnerability from cvelistv5
Published
2024-05-19 10:10
Modified
2024-12-19 08:58
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: adding lock to protect decoder context list Add a lock for the ctx_list, to avoid accessing a NULL pointer within the 'vpu_dec_ipi_handler' function when the ctx_list has been deleted due to an unexpected behavior on the SCP IP block. Hardware name: Google juniper sku16 board (DT) pstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--) pc : vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec] lr : scp_ipi_handler+0xd0/0x194 [mtk_scp] sp : ffffffc0131dbbd0 x29: ffffffc0131dbbd0 x28: 0000000000000000 x27: ffffff9bb277f348 x26: ffffff9bb242ad00 x25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4 x23: ffffff9bb7fe85a0 x22: ffffffc0133fbdb0 x21: 0000000000000010 x20: ffffff9b050ea328 x19: ffffffc0131dbc08 x18: 0000000000001000 x17: 0000000000000000 x16: ffffffd2d461c6e0 x15: 0000000000000242 x14: 000000000000018f x13: 000000000000004d x12: 0000000000000000 x11: 0000000000000001 x10: fffffffffffffff0 x9 : ffffff9bb6e793a8 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : fffffffffffffff0 x3 : 0000000000000020 x2 : ffffff9bb6e79080 x1 : 0000000000000010 x0 : ffffffc0131dbc08 Call trace: vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)] scp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)] mt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)] scp_irq_handler+0x48/0x90 [mtk_scp (HASH:7046 3)] irq_thread_fn+0x38/0x94 irq_thread+0x100/0x1c0 kthread+0x140/0x1fc ret_from_fork+0x10/0x30 Code: 54000088 f94ca50a eb14015f 54000060 (f9400108) ---[ end trace ace43ce36cbd5c93 ]--- Kernel panic - not syncing: Oops: Fatal exception SMP: stopping secondary CPUs Kernel Offset: 0x12c4000000 from 0xffffffc010000000 PHYS_OFFSET: 0xffffffe580000000 CPU features: 0x08240002,2188200c Memory Limit: none
Impacted products
Vendor Product Version
Linux Linux Version: 655b86e52eacdce79c2e02c5ec7258a97fcc2e4a
Version: 655b86e52eacdce79c2e02c5ec7258a97fcc2e4a
Version: 655b86e52eacdce79c2e02c5ec7258a97fcc2e4a
Create a notification for this product.
   Linux Linux Version: 6.6
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-35920",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-06-17T17:38:32.899934Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-17T17:41:01.161Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T03:21:49.045Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_vpu.c",
                  "drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.c",
                  "drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.h",
                  "drivers/media/platform/mediatek/vcodec/decoder/vdec_vpu_if.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "0a2dc707aa42214f9c4827bd57e344e29a0841d6",
                     status: "affected",
                     version: "655b86e52eacdce79c2e02c5ec7258a97fcc2e4a",
                     versionType: "git",
                  },
                  {
                     lessThan: "23aaf824121055ba81b55f75444355bd83c8eb38",
                     status: "affected",
                     version: "655b86e52eacdce79c2e02c5ec7258a97fcc2e4a",
                     versionType: "git",
                  },
                  {
                     lessThan: "6467cda18c9f9b5f2f9a0aa1e2861c653e41f382",
                     status: "affected",
                     version: "655b86e52eacdce79c2e02c5ec7258a97fcc2e4a",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_vpu.c",
                  "drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.c",
                  "drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.h",
                  "drivers/media/platform/mediatek/vcodec/decoder/vdec_vpu_if.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "6.6",
                  },
                  {
                     lessThan: "6.6",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.27",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.8.*",
                     status: "unaffected",
                     version: "6.8.6",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.9",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mediatek: vcodec: adding lock to protect decoder context list\n\nAdd a lock for the ctx_list, to avoid accessing a NULL pointer\nwithin the 'vpu_dec_ipi_handler' function when the ctx_list has\nbeen deleted due to an unexpected behavior on the SCP IP block.\n\nHardware name: Google juniper sku16 board (DT)\npstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--)\npc : vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec]\nlr : scp_ipi_handler+0xd0/0x194 [mtk_scp]\nsp : ffffffc0131dbbd0\nx29: ffffffc0131dbbd0 x28: 0000000000000000\nx27: ffffff9bb277f348 x26: ffffff9bb242ad00\nx25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4\nx23: ffffff9bb7fe85a0 x22: ffffffc0133fbdb0\nx21: 0000000000000010 x20: ffffff9b050ea328\nx19: ffffffc0131dbc08 x18: 0000000000001000\nx17: 0000000000000000 x16: ffffffd2d461c6e0\nx15: 0000000000000242 x14: 000000000000018f\nx13: 000000000000004d x12: 0000000000000000\nx11: 0000000000000001 x10: fffffffffffffff0\nx9 : ffffff9bb6e793a8 x8 : 0000000000000000\nx7 : 0000000000000000 x6 : 000000000000003f\nx5 : 0000000000000040 x4 : fffffffffffffff0\nx3 : 0000000000000020 x2 : ffffff9bb6e79080\nx1 : 0000000000000010 x0 : ffffffc0131dbc08\nCall trace:\nvpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)]\nscp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)]\nmt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)]\nscp_irq_handler+0x48/0x90 [mtk_scp (HASH:7046 3)]\nirq_thread_fn+0x38/0x94\nirq_thread+0x100/0x1c0\nkthread+0x140/0x1fc\nret_from_fork+0x10/0x30\nCode: 54000088 f94ca50a eb14015f 54000060 (f9400108)\n---[ end trace ace43ce36cbd5c93 ]---\nKernel panic - not syncing: Oops: Fatal exception\nSMP: stopping secondary CPUs\nKernel Offset: 0x12c4000000 from 0xffffffc010000000\nPHYS_OFFSET: 0xffffffe580000000\nCPU features: 0x08240002,2188200c\nMemory Limit: none",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T08:58:16.956Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6",
            },
            {
               url: "https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38",
            },
            {
               url: "https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382",
            },
         ],
         title: "media: mediatek: vcodec: adding lock to protect decoder context list",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-35920",
      datePublished: "2024-05-19T10:10:32.379Z",
      dateReserved: "2024-05-17T13:50:33.124Z",
      dateUpdated: "2024-12-19T08:58:16.956Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-35920\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-19T11:15:48.373\",\"lastModified\":\"2024-11-21T09:21:12.443\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: mediatek: vcodec: adding lock to protect decoder context list\\n\\nAdd a lock for the ctx_list, to avoid accessing a NULL pointer\\nwithin the 'vpu_dec_ipi_handler' function when the ctx_list has\\nbeen deleted due to an unexpected behavior on the SCP IP block.\\n\\nHardware name: Google juniper sku16 board (DT)\\npstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--)\\npc : vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec]\\nlr : scp_ipi_handler+0xd0/0x194 [mtk_scp]\\nsp : ffffffc0131dbbd0\\nx29: ffffffc0131dbbd0 x28: 0000000000000000\\nx27: ffffff9bb277f348 x26: ffffff9bb242ad00\\nx25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4\\nx23: ffffff9bb7fe85a0 x22: ffffffc0133fbdb0\\nx21: 0000000000000010 x20: ffffff9b050ea328\\nx19: ffffffc0131dbc08 x18: 0000000000001000\\nx17: 0000000000000000 x16: ffffffd2d461c6e0\\nx15: 0000000000000242 x14: 000000000000018f\\nx13: 000000000000004d x12: 0000000000000000\\nx11: 0000000000000001 x10: fffffffffffffff0\\nx9 : ffffff9bb6e793a8 x8 : 0000000000000000\\nx7 : 0000000000000000 x6 : 000000000000003f\\nx5 : 0000000000000040 x4 : fffffffffffffff0\\nx3 : 0000000000000020 x2 : ffffff9bb6e79080\\nx1 : 0000000000000010 x0 : ffffffc0131dbc08\\nCall trace:\\nvpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)]\\nscp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)]\\nmt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)]\\nscp_irq_handler+0x48/0x90 [mtk_scp (HASH:7046 3)]\\nirq_thread_fn+0x38/0x94\\nirq_thread+0x100/0x1c0\\nkthread+0x140/0x1fc\\nret_from_fork+0x10/0x30\\nCode: 54000088 f94ca50a eb14015f 54000060 (f9400108)\\n---[ end trace ace43ce36cbd5c93 ]---\\nKernel panic - not syncing: Oops: Fatal exception\\nSMP: stopping secondary CPUs\\nKernel Offset: 0x12c4000000 from 0xffffffc010000000\\nPHYS_OFFSET: 0xffffffe580000000\\nCPU features: 0x08240002,2188200c\\nMemory Limit: none\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: mediatek: vcodec: agregar bloqueo para proteger la lista de contexto del decodificador. Agregue un bloqueo para ctx_list, para evitar acceder a un puntero NULL dentro de la función 'vpu_dec_ipi_handler' cuando se ha eliminado ctx_list debido a un comportamiento inesperado en el bloque de IP de SCP. Nombre del hardware: placa Google Juniper sku16 (DT) pstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--) pc: vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec] lr: scp_ipi_handler+0xd0/0x194 [mtk_scp] sp: 31dbbd0 x29: ffffffc0131dbbd0 x28: 0000000000000000 x27: ffffff9bb277f348 x26: ffffff9bb242ad00 x25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4 x23: ffffff9bb7fe85a0 22: ffffffc0133fbdb0 x21: 0000000000000010 x20: ffffff9b050ea328 x19: ffffffc0131dbc08 x18: 0000000000001000 x17: 0000000000000000 x16: 461c6e0 x15: 0000000000000242 x14: 000000000000018f x13: 000000000000004d x12: 0000000000000000 x11: 0000000000000001 x10: fffffffffffffff0 x9: ffffff9bb6e793a8 x8: 0000000000000000 x7: 00000000000 00000 x6: 000000000000003f x5: 0000000000000040 x4: fffffffffffffff0 x3: 0000000000000020 x2: ffffff9bb6e79080 x1: 0000000000000010 x0: ffffffc013 1dbc08 Rastreo de llamadas: vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)] scp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)] mt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)] scp_irq_handler+0x48/0x90 (HASH:7046 3)] irq_thread_fn +0x38/0x94 irq_thread+0x100/0x1c0 kthread+0x140/0x1fc ret_from_fork+0x10/0x30 Código: 54000088 f94ca50a eb14015f 54000060 (f9400108) ---[ end trace ace43ce36cbd5c93 ] --- Pánico del kernel: no se sincroniza: Ups: excepción fatal SMP : detener CPU secundarias Desplazamiento del kernel: 0x12c4000000 de 0xffffffc010000000 PHYS_OFFSET: 0xffffffe580000000 Características de la CPU: 0x08240002,2188200c Límite de memoria: ninguno\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:21:49.045Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-35920\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-17T17:38:32.899934Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-17T17:38:33.930Z\"}}], \"cna\": {\"title\": \"media: mediatek: vcodec: adding lock to protect decoder context list\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"655b86e52eacdce79c2e02c5ec7258a97fcc2e4a\", \"lessThan\": \"0a2dc707aa42214f9c4827bd57e344e29a0841d6\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"655b86e52eacdce79c2e02c5ec7258a97fcc2e4a\", \"lessThan\": \"23aaf824121055ba81b55f75444355bd83c8eb38\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"655b86e52eacdce79c2e02c5ec7258a97fcc2e4a\", \"lessThan\": \"6467cda18c9f9b5f2f9a0aa1e2861c653e41f382\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_vpu.c\", \"drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.c\", \"drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.h\", \"drivers/media/platform/mediatek/vcodec/decoder/vdec_vpu_if.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.6\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.6.27\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.8.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.8.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/media/platform/mediatek/vcodec/common/mtk_vcodec_fw_vpu.c\", \"drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.c\", \"drivers/media/platform/mediatek/vcodec/decoder/mtk_vcodec_dec_drv.h\", \"drivers/media/platform/mediatek/vcodec/decoder/vdec_vpu_if.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6\"}, {\"url\": \"https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38\"}, {\"url\": \"https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmedia: mediatek: vcodec: adding lock to protect decoder context list\\n\\nAdd a lock for the ctx_list, to avoid accessing a NULL pointer\\nwithin the 'vpu_dec_ipi_handler' function when the ctx_list has\\nbeen deleted due to an unexpected behavior on the SCP IP block.\\n\\nHardware name: Google juniper sku16 board (DT)\\npstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--)\\npc : vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec]\\nlr : scp_ipi_handler+0xd0/0x194 [mtk_scp]\\nsp : ffffffc0131dbbd0\\nx29: ffffffc0131dbbd0 x28: 0000000000000000\\nx27: ffffff9bb277f348 x26: ffffff9bb242ad00\\nx25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4\\nx23: ffffff9bb7fe85a0 x22: ffffffc0133fbdb0\\nx21: 0000000000000010 x20: ffffff9b050ea328\\nx19: ffffffc0131dbc08 x18: 0000000000001000\\nx17: 0000000000000000 x16: ffffffd2d461c6e0\\nx15: 0000000000000242 x14: 000000000000018f\\nx13: 000000000000004d x12: 0000000000000000\\nx11: 0000000000000001 x10: fffffffffffffff0\\nx9 : ffffff9bb6e793a8 x8 : 0000000000000000\\nx7 : 0000000000000000 x6 : 000000000000003f\\nx5 : 0000000000000040 x4 : fffffffffffffff0\\nx3 : 0000000000000020 x2 : ffffff9bb6e79080\\nx1 : 0000000000000010 x0 : ffffffc0131dbc08\\nCall trace:\\nvpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)]\\nscp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)]\\nmt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)]\\nscp_irq_handler+0x48/0x90 [mtk_scp (HASH:7046 3)]\\nirq_thread_fn+0x38/0x94\\nirq_thread+0x100/0x1c0\\nkthread+0x140/0x1fc\\nret_from_fork+0x10/0x30\\nCode: 54000088 f94ca50a eb14015f 54000060 (f9400108)\\n---[ end trace ace43ce36cbd5c93 ]---\\nKernel panic - not syncing: Oops: Fatal exception\\nSMP: stopping secondary CPUs\\nKernel Offset: 0x12c4000000 from 0xffffffc010000000\\nPHYS_OFFSET: 0xffffffe580000000\\nCPU features: 0x08240002,2188200c\\nMemory Limit: none\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T08:58:16.956Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-35920\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T08:58:16.956Z\", \"dateReserved\": \"2024-05-17T13:50:33.124Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-19T10:10:32.379Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.