CVE-2024-50107

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2024
Last modified:
08/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses<br /> <br /> Commit 50c6dbdfd16e ("x86/ioremap: Improve iounmap() address range checks")<br /> introduces a WARN when adrress ranges of iounmap are invalid. On Thinkpad<br /> P1 Gen 7 (Meteor Lake-P) this caused the following warning to appear:<br /> <br /> WARNING: CPU: 7 PID: 713 at arch/x86/mm/ioremap.c:461 iounmap+0x58/0x1f0<br /> Modules linked in: rfkill(+) snd_timer(+) fjes(+) snd soundcore intel_pmc_core(+)<br /> int3403_thermal(+) int340x_thermal_zone intel_vsec pmt_telemetry acpi_pad pmt_class<br /> acpi_tad int3400_thermal acpi_thermal_rel joydev loop nfnetlink zram xe drm_suballoc_helper<br /> nouveau i915 mxm_wmi drm_ttm_helper gpu_sched drm_gpuvm drm_exec drm_buddy i2c_algo_bit<br /> crct10dif_pclmul crc32_pclmul ttm crc32c_intel polyval_clmulni rtsx_pci_sdmmc ucsi_acpi<br /> polyval_generic mmc_core hid_multitouch drm_display_helper ghash_clmulni_intel typec_ucsi<br /> nvme sha512_ssse3 video sha256_ssse3 nvme_core intel_vpu sha1_ssse3 rtsx_pci cec typec<br /> nvme_auth i2c_hid_acpi i2c_hid wmi pinctrl_meteorlake serio_raw ip6_tables ip_tables fuse<br /> CPU: 7 UID: 0 PID: 713 Comm: (udev-worker) Not tainted 6.12.0-rc2iounmap+ #42<br /> Hardware name: LENOVO 21KWCTO1WW/21KWCTO1WW, BIOS N48ET19W (1.06 ) 07/18/2024<br /> RIP: 0010:iounmap+0x58/0x1f0<br /> Code: 85 6a 01 00 00 48 8b 05 e6 e2 28 04 48 39 c5 72 19 eb 26 cc cc cc 48 ba 00 00 00 00 00 00 32 00 48 8d 44 02 ff 48 39 c5 72 23 0b 48 83 c4 08 5b 5d 41 5c c3 cc cc cc cc 48 ba 00 00 00 00 00<br /> RSP: 0018:ffff888131eff038 EFLAGS: 00010207<br /> RAX: ffffc90000000000 RBX: 0000000000000000 RCX: ffff888e33b80000<br /> RDX: dffffc0000000000 RSI: ffff888e33bc29c0 RDI: 0000000000000000<br /> RBP: 0000000000000000 R08: ffff8881598a8000 R09: ffff888e2ccedc10<br /> R10: 0000000000000003 R11: ffffffffb3367634 R12: 00000000fe000000<br /> R13: ffff888101d0da28 R14: ffffffffc2e437e0 R15: ffff888110b03b28<br /> FS: 00007f3c1d4b3980(0000) GS:ffff888e33b80000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00005651cfc93578 CR3: 0000000124e4c002 CR4: 0000000000f70ef0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ? __warn.cold+0xb6/0x176<br /> ? iounmap+0x58/0x1f0<br /> ? report_bug+0x1f4/0x2b0<br /> ? handle_bug+0x58/0x90<br /> ? exc_invalid_op+0x17/0x40<br /> ? asm_exc_invalid_op+0x1a/0x20<br /> ? iounmap+0x58/0x1f0<br /> pmc_core_ssram_get_pmc+0x477/0x6c0 [intel_pmc_core]<br /> ? __pfx_pmc_core_ssram_get_pmc+0x10/0x10 [intel_pmc_core]<br /> ? __pfx_do_pci_enable_device+0x10/0x10<br /> ? pci_wait_for_pending+0x60/0x110<br /> ? pci_enable_device_flags+0x1e3/0x2e0<br /> ? __pfx_mtl_core_init+0x10/0x10 [intel_pmc_core]<br /> pmc_core_ssram_init+0x7f/0x110 [intel_pmc_core]<br /> mtl_core_init+0xda/0x130 [intel_pmc_core]<br /> ? __mutex_init+0xb9/0x130<br /> pmc_core_probe+0x27e/0x10b0 [intel_pmc_core]<br /> ? _raw_spin_lock_irqsave+0x96/0xf0<br /> ? __pfx_pmc_core_probe+0x10/0x10 [intel_pmc_core]<br /> ? __pfx_mutex_unlock+0x10/0x10<br /> ? __pfx_mutex_lock+0x10/0x10<br /> ? device_pm_check_callbacks+0x82/0x370<br /> ? acpi_dev_pm_attach+0x234/0x2b0<br /> platform_probe+0x9f/0x150<br /> really_probe+0x1e0/0x8a0<br /> __driver_probe_device+0x18c/0x370<br /> ? __pfx___driver_attach+0x10/0x10<br /> driver_probe_device+0x4a/0x120<br /> __driver_attach+0x190/0x4a0<br /> ? __pfx___driver_attach+0x10/0x10<br /> bus_for_each_dev+0x103/0x180<br /> ? __pfx_bus_for_each_dev+0x10/0x10<br /> ? klist_add_tail+0x136/0x270<br /> bus_add_driver+0x2fc/0x540<br /> driver_register+0x1a5/0x360<br /> ? __pfx_pmc_core_driver_init+0x10/0x10 [intel_pmc_core]<br /> do_one_initcall+0xa4/0x380<br /> ? __pfx_do_one_initcall+0x10/0x10<br /> ? kasan_unpoison+0x44/0x70<br /> do_init_module+0x296/0x800<br /> load_module+0x5090/0x6ce0<br /> ? __pfx_load_module+0x10/0x10<br /> ? ima_post_read_file+0x193/0x200<br /> ? __pfx_ima_post_read_file+0x10/0x10<br /> ? rw_verify_area+0x152/0x4c0<br /> ? kernel_read_file+0x257/0x750<br /> ? __pfx_kernel_read_file+0x10/0x10<br /> ? __pfx_filemap_get_read_batch+0x10/0x10<br /> ? init_module_from_file+0xd1/0x130<br /> init_module_from_file+0xd1/0x130<br /> ? __pfx_init_module_from_file+0x10/0<br /> ---truncated---

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.11.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*