We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices Previously, the domain_context_clear() function incorrectly called pci_for_each_dma_alias() to set up context entries for non-PCI devices. This could lead to kernel hangs or other unexpected behavior. Add a check to only call pci_for_each_dma_alias() for PCI devices. For non-PCI devices, domain_context_clear_one() is called directly.
Reserved 2024-10-21 | Published 2024-11-05 | Updated 2024-11-19 | Assigner Linuxgit.kernel.org/...c/0bd9a30c22afb5da203386b811ec31429d2caa78
git.kernel.org/...c/cbfa3a83eba05240ce37839ed48280a05e8e8f6c
git.kernel.org/...c/fe2e0b6cd00abea3efac66de1da22d844364c1b0
git.kernel.org/...c/04d6826ba7ba81213422276e96c90c6565169e1c
git.kernel.org/...c/6e02a277f1db24fa039e23783c8921c7b0e5b1b3
Support options