In the Linux kernel, the following vulnerability has been resolved:
iommu/arm-smmu: Defer probe of clients after smmu device bound
Null pointer dereference occurs due to a race between smmu
driver probe and client driver probe, when of_dma_configure()
for client is called after the iommu_device_register() for smmu driver
probe has executed but before the driver_bound() for smmu driver
has been called.
Following is how the race occurs:
T1:Smmu device probe T2: Client device probe
really_probe()
arm_smmu_device_probe()
iommu_device_register()
really_probe()
platform_dma_configure()
of_dma_configure()
of_dma_configure_id()
of_iommu_configure()
iommu_probe_device()
iommu_init_device()
arm_smmu_probe_device()
arm_smmu_get_by_fwnode()
driver_find_device_by_fwnode()
driver_find_device()
next_device()
klist_next()
/* null ptr
assigned to smmu */
/* null ptr dereference
while smmu->streamid_mask */
driver_bound()
klist_add_tail()
When this null smmu pointer is dereferenced later in
arm_smmu_probe_device, the device crashes.
Fix this by deferring the probe of the client device
until the smmu device has bound to the arm smmu driver.
[will: Add comment]
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2025, 15:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
CWE | CWE-476 CWE-362 |
|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/229e6ee43d2a160a1592b83aad620d6027084aad - Patch | |
References | () https://git.kernel.org/stable/c/4a9485918a042e3114890dfbe19839a1897f8b2c - Patch | |
References | () https://git.kernel.org/stable/c/5018696b19bc6c021e934a8a59f4b1dd8c0ac9f8 - Patch | |
References | () https://git.kernel.org/stable/c/c2527d07c7e9cda2c6165d5edccf74752baac1b0 - Patch | |
References | () https://git.kernel.org/stable/c/dc02407ea952e20c544a078a6be2e6f008327973 - Patch | |
References | () https://git.kernel.org/stable/c/f8f794f387ad21c4696e5cd0626cb6f8a5f6aea5 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
27 Dec 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-27 15:15
Updated : 2025-02-03 15:19
NVD link : CVE-2024-56568
Mitre link : CVE-2024-56568
CVE.ORG link : CVE-2024-56568
JSON object : View
Products Affected
linux
- linux_kernel