mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
20 lines
1.3 KiB
Markdown
20 lines
1.3 KiB
Markdown
### [CVE-2024-40945](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945)
|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
In the Linux kernel, the following vulnerability has been resolved:iommu: Return right value in iommu_sva_bind_device()iommu_sva_bind_device() should return either a sva bond handle or anERR_PTR value in error cases. Existing drivers (idxd and uacce) onlycheck the return value with IS_ERR(). This could potentially lead toa kernel NULL pointer dereference issue if the function returns NULLinstead of an error pointer.In reality, this doesn't cause any problems because iommu_sva_bind_device()only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.In this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) willreturn an error, and the device drivers won't call iommu_sva_bind_device()at all.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/w4zu/Debian_security
|
|
|