Release Date: | 2024-05-01 |
In the Linux kernel, the following vulnerability has been resolved:\niommu/vt-d: Fix NULL domain on device release\nIn the kdump kernel, the IOMMU operates in deferred_attach mode. In this\nmode, info->domain may not yet be assigned by the time the release_device\nfunction is called. It leads to the following crash in the crash kernel:\nBUG: kernel NULL pointer dereference, address: 000000000000003c\n...\nRIP: 0010:do_raw_spin_lock+0xa/0xa0\n...\n_raw_spin_lock_irqsave+0x1b/0x30\nintel_iommu_release_device+0x96/0x170\niommu_deinit_device+0x39/0xf0\n__iommu_group_remove_device+0xa0/0xd0\niommu_bus_notifier+0x55/0xb0\nnotifier_call_chain+0x5a/0xd0\nblocking_notifier_call_chain+0x41/0x60\nbus_notify+0x34/0x50\ndevice_del+0x269/0x3d0\npci_remove_bus_device+0x77/0x100\np2sb_bar+0xae/0x1d0\n...\ni801_probe+0x423/0x740\nUse the release_domain mechanism to fix it. The scalable mode context\nentry which is not part of release domain should be cleared in\nrelease_device().
See more information about CVE-2024-27079 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.1 metrics and score provided are preliminary and subject to review.
Base Score: | 5.5 | CVSS Vector: | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Attack Vector: | Local network | Attack Complexity: | Low |
Privileges Required: | Low | User Interaction: | None |
Scope: | Unchanged | Confidentiality Impact: | None |
Integrity Impact: | None | Availability Impact: | High |
Platform | Errata | Release Date |
Oracle Linux version 9 (kernel) | ELSA-2024-9315 | 2024-11-14 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections: