CVE-2024-50107
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2024
Last modified:
08/11/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses<br />
<br />
Commit 50c6dbdfd16e ("x86/ioremap: Improve iounmap() address range checks")<br />
introduces a WARN when adrress ranges of iounmap are invalid. On Thinkpad<br />
P1 Gen 7 (Meteor Lake-P) this caused the following warning to appear:<br />
<br />
WARNING: CPU: 7 PID: 713 at arch/x86/mm/ioremap.c:461 iounmap+0x58/0x1f0<br />
Modules linked in: rfkill(+) snd_timer(+) fjes(+) snd soundcore intel_pmc_core(+)<br />
int3403_thermal(+) int340x_thermal_zone intel_vsec pmt_telemetry acpi_pad pmt_class<br />
acpi_tad int3400_thermal acpi_thermal_rel joydev loop nfnetlink zram xe drm_suballoc_helper<br />
nouveau i915 mxm_wmi drm_ttm_helper gpu_sched drm_gpuvm drm_exec drm_buddy i2c_algo_bit<br />
crct10dif_pclmul crc32_pclmul ttm crc32c_intel polyval_clmulni rtsx_pci_sdmmc ucsi_acpi<br />
polyval_generic mmc_core hid_multitouch drm_display_helper ghash_clmulni_intel typec_ucsi<br />
nvme sha512_ssse3 video sha256_ssse3 nvme_core intel_vpu sha1_ssse3 rtsx_pci cec typec<br />
nvme_auth i2c_hid_acpi i2c_hid wmi pinctrl_meteorlake serio_raw ip6_tables ip_tables fuse<br />
CPU: 7 UID: 0 PID: 713 Comm: (udev-worker) Not tainted 6.12.0-rc2iounmap+ #42<br />
Hardware name: LENOVO 21KWCTO1WW/21KWCTO1WW, BIOS N48ET19W (1.06 ) 07/18/2024<br />
RIP: 0010:iounmap+0x58/0x1f0<br />
Code: 85 6a 01 00 00 48 8b 05 e6 e2 28 04 48 39 c5 72 19 eb 26 cc cc cc 48 ba 00 00 00 00 00 00 32 00 48 8d 44 02 ff 48 39 c5 72 23 0b 48 83 c4 08 5b 5d 41 5c c3 cc cc cc cc 48 ba 00 00 00 00 00<br />
RSP: 0018:ffff888131eff038 EFLAGS: 00010207<br />
RAX: ffffc90000000000 RBX: 0000000000000000 RCX: ffff888e33b80000<br />
RDX: dffffc0000000000 RSI: ffff888e33bc29c0 RDI: 0000000000000000<br />
RBP: 0000000000000000 R08: ffff8881598a8000 R09: ffff888e2ccedc10<br />
R10: 0000000000000003 R11: ffffffffb3367634 R12: 00000000fe000000<br />
R13: ffff888101d0da28 R14: ffffffffc2e437e0 R15: ffff888110b03b28<br />
FS: 00007f3c1d4b3980(0000) GS:ffff888e33b80000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 00005651cfc93578 CR3: 0000000124e4c002 CR4: 0000000000f70ef0<br />
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br />
DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400<br />
PKRU: 55555554<br />
Call Trace:<br />
<br />
? __warn.cold+0xb6/0x176<br />
? iounmap+0x58/0x1f0<br />
? report_bug+0x1f4/0x2b0<br />
? handle_bug+0x58/0x90<br />
? exc_invalid_op+0x17/0x40<br />
? asm_exc_invalid_op+0x1a/0x20<br />
? iounmap+0x58/0x1f0<br />
pmc_core_ssram_get_pmc+0x477/0x6c0 [intel_pmc_core]<br />
? __pfx_pmc_core_ssram_get_pmc+0x10/0x10 [intel_pmc_core]<br />
? __pfx_do_pci_enable_device+0x10/0x10<br />
? pci_wait_for_pending+0x60/0x110<br />
? pci_enable_device_flags+0x1e3/0x2e0<br />
? __pfx_mtl_core_init+0x10/0x10 [intel_pmc_core]<br />
pmc_core_ssram_init+0x7f/0x110 [intel_pmc_core]<br />
mtl_core_init+0xda/0x130 [intel_pmc_core]<br />
? __mutex_init+0xb9/0x130<br />
pmc_core_probe+0x27e/0x10b0 [intel_pmc_core]<br />
? _raw_spin_lock_irqsave+0x96/0xf0<br />
? __pfx_pmc_core_probe+0x10/0x10 [intel_pmc_core]<br />
? __pfx_mutex_unlock+0x10/0x10<br />
? __pfx_mutex_lock+0x10/0x10<br />
? device_pm_check_callbacks+0x82/0x370<br />
? acpi_dev_pm_attach+0x234/0x2b0<br />
platform_probe+0x9f/0x150<br />
really_probe+0x1e0/0x8a0<br />
__driver_probe_device+0x18c/0x370<br />
? __pfx___driver_attach+0x10/0x10<br />
driver_probe_device+0x4a/0x120<br />
__driver_attach+0x190/0x4a0<br />
? __pfx___driver_attach+0x10/0x10<br />
bus_for_each_dev+0x103/0x180<br />
? __pfx_bus_for_each_dev+0x10/0x10<br />
? klist_add_tail+0x136/0x270<br />
bus_add_driver+0x2fc/0x540<br />
driver_register+0x1a5/0x360<br />
? __pfx_pmc_core_driver_init+0x10/0x10 [intel_pmc_core]<br />
do_one_initcall+0xa4/0x380<br />
? __pfx_do_one_initcall+0x10/0x10<br />
? kasan_unpoison+0x44/0x70<br />
do_init_module+0x296/0x800<br />
load_module+0x5090/0x6ce0<br />
? __pfx_load_module+0x10/0x10<br />
? ima_post_read_file+0x193/0x200<br />
? __pfx_ima_post_read_file+0x10/0x10<br />
? rw_verify_area+0x152/0x4c0<br />
? kernel_read_file+0x257/0x750<br />
? __pfx_kernel_read_file+0x10/0x10<br />
? __pfx_filemap_get_read_batch+0x10/0x10<br />
? init_module_from_file+0xd1/0x130<br />
init_module_from_file+0xd1/0x130<br />
? __pfx_init_module_from_file+0x10/0<br />
---truncated---
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.11.6 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page