- CVE-2024-36477
- Suggested Configuration
- OR
*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.10.0 up to (excluding) 6.10
*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.6.0 up to (excluding) 6.6.33
*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.9.0 up to (excluding) 6.9.4
- Reference
- https://www.kernel.org/pub//linux/kernel/v6.x/ChangeLog-6.10
- https://www.kernel.org/pub//linux/kernel/v6.x/ChangeLog-6.6.33
- https://www.kernel.org/pub//linux/kernel/v6.x/ChangeLog-6.9.4
- Reference (Commit)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer
- Fixed by
- 6.10 (195aba96b854dd664768f382cd1db375d8181f88) (upstream)
- 6.6.33 (1547183852dcdfcc25878db7dd3620509217b0cd)
- 6.9.4 (de13c56f99477b56980c7e00b09c776d16b7563d)
- Will be introduced by
- 6.6 (a86a42ac2bd6)
- I Checked
- XXXXXXXXXXXXXXXXXXXXXXXXXXXX is written as upstream commit in each ChangeLog
- From XXXXXXXX commit page, XXXXXXXXXXX is the most oldest in commit-branches area
- For 3.16.35, there is related post at lkml
- For 3.16 series, 3.16.35 is the next release from 3.16.7 which was released at 2014
- https://mirrors.edge.kernel.org/pub/linux/kernel/v3.x/
- XXXX
[CVE Configuration Update Request] Update Suggestion - CVE-2024-36477 - Cvss3 : 7.8
https://www.linuxkernelcves.com/cves/CVE-2024-36477 https://gitlab.com/cip-project/cip-kernel/cip-kernel-sec/-/blob/master/issues/CVE-2024-36477.yml https://github.com/witchcraze/NVD_CHECK/blob/main/kernel/CVE-2024-36477.json