We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50101

iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices



Description

In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices Previously, the domain_context_clear() function incorrectly called pci_for_each_dma_alias() to set up context entries for non-PCI devices. This could lead to kernel hangs or other unexpected behavior. Add a check to only call pci_for_each_dma_alias() for PCI devices. For non-PCI devices, domain_context_clear_one() is called directly.

Reserved 2024-10-21 | Published 2024-11-05 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

9807860f6ad4 before 0bd9a30c22af
affected

59862b869275 before cbfa3a83eba0
affected

48f2183a4f9d before fe2e0b6cd00a
affected

9a16ab9d6402 before 04d6826ba7ba
affected

9a16ab9d6402 before 6e02a277f1db
affected

Default status
affected

6.7
affected

Any version before 6.7
unaffected

5.15.169
unaffected

6.1.114
unaffected

6.6.58
unaffected

6.11.5
unaffected

6.12
unaffected

References

git.kernel.org/...c/0bd9a30c22afb5da203386b811ec31429d2caa78

git.kernel.org/...c/cbfa3a83eba05240ce37839ed48280a05e8e8f6c

git.kernel.org/...c/fe2e0b6cd00abea3efac66de1da22d844364c1b0

git.kernel.org/...c/04d6826ba7ba81213422276e96c90c6565169e1c

git.kernel.org/...c/6e02a277f1db24fa039e23783c8921c7b0e5b1b3

cve.org (CVE-2024-50101)

nvd.nist.gov (CVE-2024-50101)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50101

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.