cve/2024/CVE-2024-56760.md

18 lines
1.7 KiB
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-56760](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56760)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=d2a463b297415ca6dd4d60bb1c867dd7c931587b%3C%20b1f7476e07b93d65a1a3643dcb4a7bed80d4328d%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In the Linux kernel, the following vulnerability has been resolved:PCI/MSI: Handle lack of irqdomain gracefullyAlexandre observed a warning emitted from pci_msi_setup_msi_irqs() on aRISCV platform which does not provide PCI/MSI support: WARNING: CPU: 1 PID: 1 at drivers/pci/msi/msi.h:121 pci_msi_setup_msi_irqs+0x2c/0x32 __pci_enable_msix_range+0x30c/0x596 pci_msi_setup_msi_irqs+0x2c/0x32 pci_alloc_irq_vectors_affinity+0xb8/0xe2RISCV uses hierarchical interrupt domains and correctly does not implementthe legacy fallback. The warning triggers from the legacy fallback stub.That warning is bogus as the PCI/MSI layer knows whether a PCI/MSI parentdomain is associated with the device or not. There is a check for MSI-X,which has a legacy assumption. But that legacy fallback assumption is onlyvalid when legacy support is enabled, but otherwise the check should simplyreturn -ENOTSUPP.Loongarch tripped over the same problem and blindly enabled legacy supportwithout implementing the legacy fallbacks. There are weak implementationswhich return an error, so the problem was papered over.Correct pci_msi_domain_supports() to evaluate the legacy mode and addthe missing supported check into the MSI enable path to complete it.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/oogasawa/Utility-security