First published: Wed Oct 09 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware If the value of max_speed_hz is 0, it may cause a division by zero error in hisi_calc_effective_speed(). The value of max_speed_hz is provided by firmware. Firmware is generally considered as a trusted domain. However, as division by zero errors can cause system failure, for defense measure, the value of max_speed is validated here. So 0 is regarded as invalid and an error code is returned.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <6.6.51 | |
Linux kernel | >=6.7<6.10.10 | |
Linux kernel | =6.11-rc1 | |
Linux kernel | =6.11-rc2 | |
Linux Kernel | <6.6.51 | |
Linux Kernel | >=6.7<6.10.10 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
debian/linux | <=6.1.129-1<=6.1.128-1 | 5.10.223-1 5.10.234-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47664 is classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-47664, update to the latest patched version of the Linux kernel as specified in the mitigation notes.
CVE-2024-47664 affects multiple versions of the Linux kernel including specific ranges such as versions up to 6.6.51 and between 6.7 and 6.10.10.
The potential impact of CVE-2024-47664 includes a division by zero error that could lead to system instability or crashes.
The recommended versions to upgrade to for mitigating CVE-2024-47664 include versions 5.10.223-1, 5.10.226-1, and 6.12.11-1.