In the Linux kernel, the following vulnerability has been resolved:
swiotlb: initialise restricted pool list_head when SWIOTLB_DYNAMIC=y
Using restricted DMA pools (CONFIG_DMA_RESTRICTED_POOL=y) in conjunction
with dynamic SWIOTLB (CONFIG_SWIOTLB_DYNAMIC=y) leads to the following
crash when initialising the restricted pools at boot-time:
| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
| Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
| pc : rmem_swiotlb_device_init+0xfc/0x1ec
| lr : rmem_swiotlb_device_init+0xf0/0x1ec
| Call trace:
| rmem_swiotlb_device_init+0xfc/0x1ec
| of_reserved_mem_device_init_by_idx+0x18c/0x238
| of_dma_configure_id+0x31c/0x33c
| platform_dma_configure+0x34/0x80
faddr2line reveals that the crash is in the list validation code:
include/linux/list.h:83
include/linux/rculist.h:79
include/linux/rculist.h:106
kernel/dma/swiotlb.c:306
kernel/dma/swiotlb.c:1695
because add_mem_pool() is trying to list_add_rcu() to a NULL
'mem->pools'.
Fix the crash by initialising the 'mem->pools' list_head in
rmem_swiotlb_device_init() before calling add_mem_pool().
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/75961ffb5cb3e5196f19cae7683f35cc88b50800 - Patch | |
References | () https://git.kernel.org/stable/c/f2a6b3ed20f2dea4cb645abc6a73c4595662adca - Patch | |
References | () https://git.kernel.org/stable/c/f62e0fefcdfe2c05ccb1aa80521a69524eea9c84 - Patch |
10 Jun 2024, 19:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
References | () https://git.kernel.org/stable/c/75961ffb5cb3e5196f19cae7683f35cc88b50800 - Patch | |
References | () https://git.kernel.org/stable/c/f2a6b3ed20f2dea4cb645abc6a73c4595662adca - Patch | |
References | () https://git.kernel.org/stable/c/f62e0fefcdfe2c05ccb1aa80521a69524eea9c84 - Patch | |
First Time |
Linux
Linux linux Kernel |
|
Summary |
|
|
CWE | CWE-476 |
30 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-30 16:15
Updated : 2024-11-21 09:22
NVD link : CVE-2024-36925
Mitre link : CVE-2024-36925
CVE.ORG link : CVE-2024-36925
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference