cve/2024/CVE-2024-53232.md
2025-09-29 21:09:30 +02:00

20 lines
1.4 KiB
Markdown

### [CVE-2024-53232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53232)
![](https://img.shields.io/static/v1?label=Product&message=Linux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=c76c067e488ccd55734c3e750799caf2c5956db6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
In the Linux kernel, the following vulnerability has been resolved:iommu/s390: Implement blocking domainThis fixes a crash when surprise hot-unplugging a PCI device. This crashhappens because during hot-unplug __iommu_group_set_domain_nofail()attaching the default domain fails when the platform no longerrecognizes the device as it has already been removed and we end up witha NULL domain pointer and UAF. This is exactly the case referred to inthe second comment in __iommu_device_set_domain() and just as statedthere if we can instead attach the blocking domain the UAF is preventedas this can handle the already removed device. Implement the blockingdomain to use this handling. With this change, the crash is fixed butwe still hit a warning attempting to change DMA ownership on a blockeddevice.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/cku-heise/euvd-api-doc