cve-2024-36884
Vulnerability from cvelistv5
Published
2024-05-30 15:28
Modified
2024-08-02 03:43
Severity
Summary
iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()
Impacted products
VendorProduct
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36884",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-17T17:32:53.413212Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-17T17:33:10.028Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:43:49.220Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/e83de8f05b998e227b48cdeea54cba4c9d66d3aa"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/65ade5653f5ab5a21635e51d0c65e95f490f5b6f"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/iommu/arm/arm-smmu/arm-smmu-nvidia.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e83de8f05b99",
              "status": "affected",
              "version": "e0976331ad11",
              "versionType": "git"
            },
            {
              "lessThan": "65ade5653f5a",
              "status": "affected",
              "version": "e0976331ad11",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/iommu/arm/arm-smmu/arm-smmu-nvidia.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.8"
            },
            {
              "lessThan": "6.8",
              "status": "unaffected",
              "version": "0",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.8.*",
              "status": "unaffected",
              "version": "6.8.10",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.9",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()\n\nThis was missed because of the function pointer indirection.\n\nnvidia_smmu_context_fault() is also installed as a irq function, and the\n\u0027void *\u0027 was changed to a struct arm_smmu_domain. Since the iommu_domain\nis embedded at a non-zero offset this causes nvidia_smmu_context_fault()\nto miscompute the offset. Fixup the types.\n\n  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000120\n  Mem abort info:\n    ESR = 0x0000000096000004\n    EC = 0x25: DABT (current EL), IL = 32 bits\n    SET = 0, FnV = 0\n    EA = 0, S1PTW = 0\n    FSC = 0x04: level 0 translation fault\n  Data abort info:\n    ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\n    CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n    GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n  user pgtable: 4k pages, 48-bit VAs, pgdp=0000000107c9f000\n  [0000000000000120] pgd=0000000000000000, p4d=0000000000000000\n  Internal error: Oops: 0000000096000004 [#1] SMP\n  Modules linked in:\n  CPU: 1 PID: 47 Comm: kworker/u25:0 Not tainted 6.9.0-0.rc7.58.eln136.aarch64 #1\n  Hardware name: Unknown NVIDIA Jetson Orin NX/NVIDIA Jetson Orin NX, BIOS 3.1-32827747 03/19/2023\n  Workqueue: events_unbound deferred_probe_work_func\n  pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  pc : nvidia_smmu_context_fault+0x1c/0x158\n  lr : __free_irq+0x1d4/0x2e8\n  sp : ffff80008044b6f0\n  x29: ffff80008044b6f0 x28: ffff000080a60b18 x27: ffffd32b5172e970\n  x26: 0000000000000000 x25: ffff0000802f5aac x24: ffff0000802f5a30\n  x23: ffff0000802f5b60 x22: 0000000000000057 x21: 0000000000000000\n  x20: ffff0000802f5a00 x19: ffff000087d4cd80 x18: ffffffffffffffff\n  x17: 6234362066666666 x16: 6630303078302d30 x15: ffff00008156d888\n  x14: 0000000000000000 x13: ffff0000801db910 x12: ffff00008156d6d0\n  x11: 0000000000000003 x10: ffff0000801db918 x9 : ffffd32b50f94d9c\n  x8 : 1fffe0001032fda1 x7 : ffff00008197ed00 x6 : 000000000000000f\n  x5 : 000000000000010e x4 : 000000000000010e x3 : 0000000000000000\n  x2 : ffffd32b51720cd8 x1 : ffff000087e6f700 x0 : 0000000000000057\n  Call trace:\n   nvidia_smmu_context_fault+0x1c/0x158\n   __free_irq+0x1d4/0x2e8\n   free_irq+0x3c/0x80\n   devm_free_irq+0x64/0xa8\n   arm_smmu_domain_free+0xc4/0x158\n   iommu_domain_free+0x44/0xa0\n   iommu_deinit_device+0xd0/0xf8\n   __iommu_group_remove_device+0xcc/0xe0\n   iommu_bus_notifier+0x64/0xa8\n   notifier_call_chain+0x78/0x148\n   blocking_notifier_call_chain+0x4c/0x90\n   bus_notify+0x44/0x70\n   device_del+0x264/0x3e8\n   pci_remove_bus_device+0x84/0x120\n   pci_remove_root_bus+0x5c/0xc0\n   dw_pcie_host_deinit+0x38/0xe0\n   tegra_pcie_config_rp+0xc0/0x1f0\n   tegra_pcie_dw_probe+0x34c/0x700\n   platform_probe+0x70/0xe8\n   really_probe+0xc8/0x3a0\n   __driver_probe_device+0x84/0x160\n   driver_probe_device+0x44/0x130\n   __device_attach_driver+0xc4/0x170\n   bus_for_each_drv+0x90/0x100\n   __device_attach+0xa8/0x1c8\n   device_initial_probe+0x1c/0x30\n   bus_probe_device+0xb0/0xc0\n   deferred_probe_work_func+0xbc/0x120\n   process_one_work+0x194/0x490\n   worker_thread+0x284/0x3b0\n   kthread+0xf4/0x108\n   ret_from_fork+0x10/0x20\n  Code: a9b97bfd 910003fd a9025bf5 f85a0035 (b94122a1)"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-30T15:28:53.894Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e83de8f05b998e227b48cdeea54cba4c9d66d3aa"
        },
        {
          "url": "https://git.kernel.org/stable/c/65ade5653f5ab5a21635e51d0c65e95f490f5b6f"
        }
      ],
      "title": "iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()",
      "x_generator": {
        "engine": "bippy-a5840b7849dd"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-36884",
    "datePublished": "2024-05-30T15:28:53.894Z",
    "dateReserved": "2024-05-30T15:25:07.065Z",
    "dateUpdated": "2024-08-02T03:43:49.220Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-36884\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-30T16:15:11.987\",\"lastModified\":\"2024-06-10T19:21:50.973\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\niommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()\\n\\nThis was missed because of the function pointer indirection.\\n\\nnvidia_smmu_context_fault() is also installed as a irq function, and the\\n\u0027void *\u0027 was changed to a struct arm_smmu_domain. Since the iommu_domain\\nis embedded at a non-zero offset this causes nvidia_smmu_context_fault()\\nto miscompute the offset. Fixup the types.\\n\\n  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000120\\n  Mem abort info:\\n    ESR = 0x0000000096000004\\n    EC = 0x25: DABT (current EL), IL = 32 bits\\n    SET = 0, FnV = 0\\n    EA = 0, S1PTW = 0\\n    FSC = 0x04: level 0 translation fault\\n  Data abort info:\\n    ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\\n    CM = 0, WnR = 0, TnD = 0, TagAccess = 0\\n    GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\\n  user pgtable: 4k pages, 48-bit VAs, pgdp=0000000107c9f000\\n  [0000000000000120] pgd=0000000000000000, p4d=0000000000000000\\n  Internal error: Oops: 0000000096000004 [#1] SMP\\n  Modules linked in:\\n  CPU: 1 PID: 47 Comm: kworker/u25:0 Not tainted 6.9.0-0.rc7.58.eln136.aarch64 #1\\n  Hardware name: Unknown NVIDIA Jetson Orin NX/NVIDIA Jetson Orin NX, BIOS 3.1-32827747 03/19/2023\\n  Workqueue: events_unbound deferred_probe_work_func\\n  pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n  pc : nvidia_smmu_context_fault+0x1c/0x158\\n  lr : __free_irq+0x1d4/0x2e8\\n  sp : ffff80008044b6f0\\n  x29: ffff80008044b6f0 x28: ffff000080a60b18 x27: ffffd32b5172e970\\n  x26: 0000000000000000 x25: ffff0000802f5aac x24: ffff0000802f5a30\\n  x23: ffff0000802f5b60 x22: 0000000000000057 x21: 0000000000000000\\n  x20: ffff0000802f5a00 x19: ffff000087d4cd80 x18: ffffffffffffffff\\n  x17: 6234362066666666 x16: 6630303078302d30 x15: ffff00008156d888\\n  x14: 0000000000000000 x13: ffff0000801db910 x12: ffff00008156d6d0\\n  x11: 0000000000000003 x10: ffff0000801db918 x9 : ffffd32b50f94d9c\\n  x8 : 1fffe0001032fda1 x7 : ffff00008197ed00 x6 : 000000000000000f\\n  x5 : 000000000000010e x4 : 000000000000010e x3 : 0000000000000000\\n  x2 : ffffd32b51720cd8 x1 : ffff000087e6f700 x0 : 0000000000000057\\n  Call trace:\\n   nvidia_smmu_context_fault+0x1c/0x158\\n   __free_irq+0x1d4/0x2e8\\n   free_irq+0x3c/0x80\\n   devm_free_irq+0x64/0xa8\\n   arm_smmu_domain_free+0xc4/0x158\\n   iommu_domain_free+0x44/0xa0\\n   iommu_deinit_device+0xd0/0xf8\\n   __iommu_group_remove_device+0xcc/0xe0\\n   iommu_bus_notifier+0x64/0xa8\\n   notifier_call_chain+0x78/0x148\\n   blocking_notifier_call_chain+0x4c/0x90\\n   bus_notify+0x44/0x70\\n   device_del+0x264/0x3e8\\n   pci_remove_bus_device+0x84/0x120\\n   pci_remove_root_bus+0x5c/0xc0\\n   dw_pcie_host_deinit+0x38/0xe0\\n   tegra_pcie_config_rp+0xc0/0x1f0\\n   tegra_pcie_dw_probe+0x34c/0x700\\n   platform_probe+0x70/0xe8\\n   really_probe+0xc8/0x3a0\\n   __driver_probe_device+0x84/0x160\\n   driver_probe_device+0x44/0x130\\n   __device_attach_driver+0xc4/0x170\\n   bus_for_each_drv+0x90/0x100\\n   __device_attach+0xa8/0x1c8\\n   device_initial_probe+0x1c/0x30\\n   bus_probe_device+0xb0/0xc0\\n   deferred_probe_work_func+0xbc/0x120\\n   process_one_work+0x194/0x490\\n   worker_thread+0x284/0x3b0\\n   kthread+0xf4/0x108\\n   ret_from_fork+0x10/0x20\\n  Code: a9b97bfd 910003fd a9025bf5 f85a0035 (b94122a1)\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/arm-smmu: use el tipo correcto en nvidia_smmu_context_fault() Esto se omiti\u00f3 debido a la direcci\u00f3n indirecta del puntero de funci\u00f3n. nvidia_smmu_context_fault() tambi\u00e9n est\u00e1 instalado como una funci\u00f3n irq, y \u0027void *\u0027 se cambi\u00f3 a una estructura arm_smmu_domain. Dado que iommu_domain est\u00e1 incrustado en un desplazamiento distinto de cero, esto hace que nvidia_smmu_context_fault() calcule mal el desplazamiento. Arregle los tipos. No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000120 Informaci\u00f3n de cancelaci\u00f3n de memoria: ESR = 0x0000000096000004 EC = 0x25: DABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: falla de traducci\u00f3n de nivel 0 Informaci\u00f3n de cancelaci\u00f3n de datos: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 usuario pgtable: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000107c9f000 [0000000000000120] pgd=0000000000000000, p4d=00000000000000000 Error interno: Ups: 0000000096000004 [# 1] M\u00f3dulos SMP vinculados en: CPU: 1 PID: 47 Comm: kworker/u25: 0 No contaminado 6.9.0-0.rc7.58.eln136.aarch64 #1 Nombre de hardware: Desconocido NVIDIA Jetson Orin NX/NVIDIA Jetson Orin NX, BIOS 3.1-32827747 19/03/2023 Cola de trabajo: events_unbound deferred_probe_work_func pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: nvidia_smmu_context_fault+0x1c/0x158 lr: __free_irq+0x1d4/0x2e8 sp: ffff80008044b6f0 x29: ffff80008044b6f0 x28: b18 x27: ffffd32b5172e970 x26: 0000000000000000 x25: ffff0000802f5aac x24: ffff0000802f5a30 x23: ffff0000802f5b60 x22: 0000000000000057 x21: 0000000000000000 x20: ffff0000802f5a00 x19: ffff000087d4cd80 x18: ffffff x17: 6234362066666666 x16: 6630303078302d30 x15: ffff00008156d888 x14: 00000000000000000 x13: ffff0000801db910 x12: ffff00008156d6d0 x1 1: 0000000000000003 x10: ffff0000801db918 x9: ffffd32b50f94d9c x8: 1fffe0001032fda1 x7 : ffff00008197ed00 x6 : 000000000000000f x5 : 000000000000010e x4 : 000000000000010e x3 : 00000000000000000 x2 : ffffd32b51720cd8 x1 : ffff00008 7e6f700 x0: 0000000000000057 Rastreo de llamadas: nvidia_smmu_context_fault+0x1c/0x158 __free_irq+0x1d4/0x2e8 free_irq+0x3c/0x80 devm_free_irq+0x64/0xa8 arm_smmu_domain_free+0xc4/ 0x158 iommu_domain_free+0x44/0xa0 iommu_deinit_device+0xd0/0xf8 __iommu_group_remove_device+0xcc/0xe0 iommu_bus_notifier+0x64/0xa8 notifier_call_chain+0x78/0x148 blocking_notifier_call_chain+0x4c/0x9 0 bus_notify+0x44/0x70 dispositivo_del+0x264/0x3e8 pci_remove_bus_device+0x84/0x120 pci_remove_root_bus+0x5c/ 0xc0 dw_pcie_host_deinit+0x38/0xe0 tegra_pcie_config_rp+0xc0/0x1f0 tegra_pcie_dw_probe+0x34c/0x700 platform_probe+0x70/0xe8 very_probe+0xc8/0x3a0 __driver_probe_device+0x84/0x160 _dispositivo+0x44/0x130 __device_attach_driver+0xc4/0x170 bus_for_each_drv+0x90/0x100 __device_attach+0xa8/ 0x1c8 sonda_inicial_dispositivo+0x1c/0x30 dispositivo_probe_bus+0xb0/0xc0 funci\u00f3n_trabajo_probe_diferida+0xbc/0x120 trabajo_uno_proceso+0x194/0x490 hilo_trabajador+0x284/0x3b0 kthread+0xf4/0x108 ret_from_fork+0x10/0x2 0 C\u00f3digo: a9b97bfd 910003fd a9025bf5 f85a0035 (b94122a1)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.8\",\"versionEndExcluding\":\"6.8.10\",\"matchCriteriaId\":\"B0D3E543-9D44-48EC-AEFE-B1F1DE163D83\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/65ade5653f5ab5a21635e51d0c65e95f490f5b6f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e83de8f05b998e227b48cdeea54cba4c9d66d3aa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...