CVE-2024-26814

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
05/04/2024
Last modified:
27/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vfio/fsl-mc: Block calling interrupt handler without trigger<br /> <br /> The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is<br /> initially NULL and may become NULL if the user sets the trigger<br /> eventfd to -1. The interrupt handler itself is guaranteed that<br /> trigger is always valid between request_irq() and free_irq(), but<br /> the loopback testing mechanisms to invoke the handler function<br /> need to test the trigger. The triggering and setting ioctl paths<br /> both make use of igate and are therefore mutually exclusive.<br /> <br /> The vfio-fsl-mc driver does not make use of irqfds, nor does it<br /> support any sort of masking operations, therefore unlike vfio-pci<br /> and vfio-platform, the flow can remain essentially unchanged.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10 (including) 6.1.84 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.7.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.8.3 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8.4 (including) 6.8.12 (including)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*