CVE-2024-50101

medium

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices Previously, the domain_context_clear() function incorrectly called pci_for_each_dma_alias() to set up context entries for non-PCI devices. This could lead to kernel hangs or other unexpected behavior. Add a check to only call pci_for_each_dma_alias() for PCI devices. For non-PCI devices, domain_context_clear_one() is called directly.

References

https://git.kernel.org/stable/c/fe2e0b6cd00abea3efac66de1da22d844364c1b0

https://git.kernel.org/stable/c/cbfa3a83eba05240ce37839ed48280a05e8e8f6c

https://git.kernel.org/stable/c/6e02a277f1db24fa039e23783c8921c7b0e5b1b3

https://git.kernel.org/stable/c/0bd9a30c22afb5da203386b811ec31429d2caa78

https://git.kernel.org/stable/c/04d6826ba7ba81213422276e96c90c6565169e1c

Details

Source: Mitre, NVD

Published: 2024-11-05

Updated: 2024-11-12

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium