CVE-2024-41085 (GCVE-0-2024-41085)

Vulnerability from cvelistv5 – Published: 2024-07-29 15:48 – Updated: 2026-05-11 20:25
VLAI?
Title
cxl/mem: Fix no cxl_nvd during pmem region auto-assembling
Summary
In the Linux kernel, the following vulnerability has been resolved: cxl/mem: Fix no cxl_nvd during pmem region auto-assembling When CXL subsystem is auto-assembling a pmem region during cxl endpoint port probing, always hit below calltrace. BUG: kernel NULL pointer dereference, address: 0000000000000078 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] Call Trace: <TASK> ? __die+0x24/0x70 ? page_fault_oops+0x82/0x160 ? do_user_addr_fault+0x65/0x6b0 ? exc_page_fault+0x7d/0x170 ? asm_exc_page_fault+0x26/0x30 ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem] cxl_bus_probe+0x1b/0x60 [cxl_core] really_probe+0x173/0x410 ? __pfx___device_attach_driver+0x10/0x10 __driver_probe_device+0x80/0x170 driver_probe_device+0x1e/0x90 __device_attach_driver+0x90/0x120 bus_for_each_drv+0x84/0xe0 __device_attach+0xbc/0x1f0 bus_probe_device+0x90/0xa0 device_add+0x51c/0x710 devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core] cxl_bus_probe+0x1b/0x60 [cxl_core] The cxl_nvd of the memdev needs to be available during the pmem region probe. Currently the cxl_nvd is registered after the endpoint port probe. The endpoint probe, in the case of autoassembly of regions, can cause a pmem region probe requiring the not yet available cxl_nvd. Adjust the sequence so this dependency is met. This requires adding a port parameter to cxl_find_nvdimm_bridge() that can be used to query the ancestor root port. The endpoint port is not yet available, but will share a common ancestor with its parent, so start the query from there instead.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: f17b558d6663101f876a1d9cbbad3de0c8f4ce4d , < 1d064e4fbebcf5b18dc10c1f3973487eb163b600 (git)
Affected: f17b558d6663101f876a1d9cbbad3de0c8f4ce4d , < 84ec985944ef34a34a1605b93ce401aa8737af96 (git)
Create a notification for this product.
Linux Linux Affected: 6.2
Unaffected: 0 , < 6.2 (semver)
Unaffected: 6.9.8 , ≤ 6.9.* (semver)
Unaffected: 6.10 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:46:52.323Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41085",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:20:52.180696Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:33:58.962Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/cxl/core/pmem.c",
            "drivers/cxl/core/region.c",
            "drivers/cxl/cxl.h",
            "drivers/cxl/mem.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "1d064e4fbebcf5b18dc10c1f3973487eb163b600",
              "status": "affected",
              "version": "f17b558d6663101f876a1d9cbbad3de0c8f4ce4d",
              "versionType": "git"
            },
            {
              "lessThan": "84ec985944ef34a34a1605b93ce401aa8737af96",
              "status": "affected",
              "version": "f17b558d6663101f876a1d9cbbad3de0c8f4ce4d",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/cxl/core/pmem.c",
            "drivers/cxl/core/region.c",
            "drivers/cxl/cxl.h",
            "drivers/cxl/mem.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.2"
            },
            {
              "lessThan": "6.2",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9.8",
                  "versionStartIncluding": "6.2",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10",
                  "versionStartIncluding": "6.2",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\n\nWhen CXL subsystem is auto-assembling a pmem region during cxl\nendpoint port probing, always hit below calltrace.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000078\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n Call Trace:\n  \u003cTASK\u003e\n  ? __die+0x24/0x70\n  ? page_fault_oops+0x82/0x160\n  ? do_user_addr_fault+0x65/0x6b0\n  ? exc_page_fault+0x7d/0x170\n  ? asm_exc_page_fault+0x26/0x30\n  ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\n  ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\n  really_probe+0x173/0x410\n  ? __pfx___device_attach_driver+0x10/0x10\n  __driver_probe_device+0x80/0x170\n  driver_probe_device+0x1e/0x90\n  __device_attach_driver+0x90/0x120\n  bus_for_each_drv+0x84/0xe0\n  __device_attach+0xbc/0x1f0\n  bus_probe_device+0x90/0xa0\n  device_add+0x51c/0x710\n  devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\n\nThe cxl_nvd of the memdev needs to be available during the pmem region\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\nThe endpoint probe, in the case of autoassembly of regions, can cause a\npmem region probe requiring the not yet available cxl_nvd. Adjust the\nsequence so this dependency is met.\n\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\ncan be used to query the ancestor root port. The endpoint port is not\nyet available, but will share a common ancestor with its parent, so\nstart the query from there instead."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T20:25:54.317Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600"
        },
        {
          "url": "https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96"
        }
      ],
      "title": "cxl/mem: Fix no cxl_nvd during pmem region auto-assembling",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-41085",
    "datePublished": "2024-07-29T15:48:01.267Z",
    "dateReserved": "2024-07-12T12:17:45.634Z",
    "dateUpdated": "2026-05-11T20:25:54.317Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2024-41085",
      "date": "2026-05-22",
      "epss": "9e-05",
      "percentile": "0.01022"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"versionEndExcluding\": \"6.9.8\", \"matchCriteriaId\": \"B1E72D1C-41AE-472D-B8E0-41305E0F9994\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\\n\\nWhen CXL subsystem is auto-assembling a pmem region during cxl\\nendpoint port probing, always hit below calltrace.\\n\\n BUG: kernel NULL pointer dereference, address: 0000000000000078\\n #PF: supervisor read access in kernel mode\\n #PF: error_code(0x0000) - not-present page\\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\\n Call Trace:\\n  \u003cTASK\u003e\\n  ? __die+0x24/0x70\\n  ? page_fault_oops+0x82/0x160\\n  ? do_user_addr_fault+0x65/0x6b0\\n  ? exc_page_fault+0x7d/0x170\\n  ? asm_exc_page_fault+0x26/0x30\\n  ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\\n  ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\\n  really_probe+0x173/0x410\\n  ? __pfx___device_attach_driver+0x10/0x10\\n  __driver_probe_device+0x80/0x170\\n  driver_probe_device+0x1e/0x90\\n  __device_attach_driver+0x90/0x120\\n  bus_for_each_drv+0x84/0xe0\\n  __device_attach+0xbc/0x1f0\\n  bus_probe_device+0x90/0xa0\\n  device_add+0x51c/0x710\\n  devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\\n\\nThe cxl_nvd of the memdev needs to be available during the pmem region\\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\\nThe endpoint probe, in the case of autoassembly of regions, can cause a\\npmem region probe requiring the not yet available cxl_nvd. Adjust the\\nsequence so this dependency is met.\\n\\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\\ncan be used to query the ancestor root port. The endpoint port is not\\nyet available, but will share a common ancestor with its parent, so\\nstart the query from there instead.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cxl/mem: no se corrige cxl_nvd durante el autoensamblaje de la regi\\u00f3n pmem. Cuando el subsistema CXL ensambla autom\\u00e1ticamente una regi\\u00f3n pmem durante el sondeo del puerto del endpoint cxl, presione siempre debajo de calltrace. ERROR: desreferencia del puntero NULL del kernel, direcci\\u00f3n: 0000000000000078 #PF: acceso de lectura del supervisor en modo kernel #PF: c\\u00f3digo_error(0x0000) - p\\u00e1gina no presente RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] Seguimiento de llamadas:  ? __morir+0x24/0x70 ? page_fault_oops+0x82/0x160? do_user_addr_fault+0x65/0x6b0? exc_page_fault+0x7d/0x170? asm_exc_page_fault+0x26/0x30? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem] cxl_bus_probe+0x1b/0x60 [cxl_core] really_probe+0x173/0x410? __pfx___device_attach_driver+0x10/0x10 __driver_probe_device+0x80/0x170 driver_probe_device+0x1e/0x90 __device_attach_driver+0x90/0x120 bus_for_each_drv+0x84/0xe0 __device_attach+0xbc/0x1f0 be_device+0x90/0xa0 device_add+0x51c/0x710 devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core] cxl_bus_probe+ 0x1b/0x60 [cxl_core] El cxl_nvd de memdev debe estar disponible durante el sondeo de la regi\\u00f3n pmem. Actualmente, cxl_nvd est\\u00e1 registrado despu\\u00e9s de la sonda del puerto del endpoint. La sonda de endpoint, en el caso de autoensamblaje de regiones, puede provocar una sonda de regi\\u00f3n pmem que requiera el cxl_nvd a\\u00fan no disponible. Ajuste la secuencia para que se cumpla esta dependencia. Esto requiere agregar un par\\u00e1metro de puerto a cxl_find_nvdimm_bridge() que se puede usar para consultar el puerto ra\\u00edz ancestro. El puerto del endpoint a\\u00fan no est\\u00e1 disponible, pero compartir\\u00e1 un ancestro com\\u00fan con su padre, as\\u00ed que inicie la consulta desde all\\u00ed.\"}]",
      "id": "CVE-2024-41085",
      "lastModified": "2024-11-21T09:32:12.837",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2024-07-29T16:15:03.960",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-41085\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-29T16:15:03.960\",\"lastModified\":\"2024-11-21T09:32:12.837\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\\n\\nWhen CXL subsystem is auto-assembling a pmem region during cxl\\nendpoint port probing, always hit below calltrace.\\n\\n BUG: kernel NULL pointer dereference, address: 0000000000000078\\n #PF: supervisor read access in kernel mode\\n #PF: error_code(0x0000) - not-present page\\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\\n Call Trace:\\n  \u003cTASK\u003e\\n  ? __die+0x24/0x70\\n  ? page_fault_oops+0x82/0x160\\n  ? do_user_addr_fault+0x65/0x6b0\\n  ? exc_page_fault+0x7d/0x170\\n  ? asm_exc_page_fault+0x26/0x30\\n  ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\\n  ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\\n  really_probe+0x173/0x410\\n  ? __pfx___device_attach_driver+0x10/0x10\\n  __driver_probe_device+0x80/0x170\\n  driver_probe_device+0x1e/0x90\\n  __device_attach_driver+0x90/0x120\\n  bus_for_each_drv+0x84/0xe0\\n  __device_attach+0xbc/0x1f0\\n  bus_probe_device+0x90/0xa0\\n  device_add+0x51c/0x710\\n  devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\\n\\nThe cxl_nvd of the memdev needs to be available during the pmem region\\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\\nThe endpoint probe, in the case of autoassembly of regions, can cause a\\npmem region probe requiring the not yet available cxl_nvd. Adjust the\\nsequence so this dependency is met.\\n\\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\\ncan be used to query the ancestor root port. The endpoint port is not\\nyet available, but will share a common ancestor with its parent, so\\nstart the query from there instead.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cxl/mem: no se corrige cxl_nvd durante el autoensamblaje de la regi\u00f3n pmem. Cuando el subsistema CXL ensambla autom\u00e1ticamente una regi\u00f3n pmem durante el sondeo del puerto del endpoint cxl, presione siempre debajo de calltrace. ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000078 #PF: acceso de lectura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] Seguimiento de llamadas:  ? __morir+0x24/0x70 ? page_fault_oops+0x82/0x160? do_user_addr_fault+0x65/0x6b0? exc_page_fault+0x7d/0x170? asm_exc_page_fault+0x26/0x30? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem] ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem] cxl_bus_probe+0x1b/0x60 [cxl_core] really_probe+0x173/0x410? __pfx___device_attach_driver+0x10/0x10 __driver_probe_device+0x80/0x170 driver_probe_device+0x1e/0x90 __device_attach_driver+0x90/0x120 bus_for_each_drv+0x84/0xe0 __device_attach+0xbc/0x1f0 be_device+0x90/0xa0 device_add+0x51c/0x710 devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core] cxl_bus_probe+ 0x1b/0x60 [cxl_core] El cxl_nvd de memdev debe estar disponible durante el sondeo de la regi\u00f3n pmem. Actualmente, cxl_nvd est\u00e1 registrado despu\u00e9s de la sonda del puerto del endpoint. La sonda de endpoint, en el caso de autoensamblaje de regiones, puede provocar una sonda de regi\u00f3n pmem que requiera el cxl_nvd a\u00fan no disponible. Ajuste la secuencia para que se cumpla esta dependencia. Esto requiere agregar un par\u00e1metro de puerto a cxl_find_nvdimm_bridge() que se puede usar para consultar el puerto ra\u00edz ancestro. El puerto del endpoint a\u00fan no est\u00e1 disponible, pero compartir\u00e1 un ancestro com\u00fan con su padre, as\u00ed que inicie la consulta desde all\u00ed.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.9.8\",\"matchCriteriaId\":\"B1E72D1C-41AE-472D-B8E0-41305E0F9994\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:46:52.323Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41085\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:20:52.180696Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:19.965Z\"}}], \"cna\": {\"title\": \"cxl/mem: Fix no cxl_nvd during pmem region auto-assembling\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"f17b558d6663101f876a1d9cbbad3de0c8f4ce4d\", \"lessThan\": \"1d064e4fbebcf5b18dc10c1f3973487eb163b600\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"f17b558d6663101f876a1d9cbbad3de0c8f4ce4d\", \"lessThan\": \"84ec985944ef34a34a1605b93ce401aa8737af96\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/cxl/core/pmem.c\", \"drivers/cxl/core/region.c\", \"drivers/cxl/cxl.h\", \"drivers/cxl/mem.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.2\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.9.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/cxl/core/pmem.c\", \"drivers/cxl/core/region.c\", \"drivers/cxl/cxl.h\", \"drivers/cxl/mem.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/1d064e4fbebcf5b18dc10c1f3973487eb163b600\"}, {\"url\": \"https://git.kernel.org/stable/c/84ec985944ef34a34a1605b93ce401aa8737af96\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncxl/mem: Fix no cxl_nvd during pmem region auto-assembling\\n\\nWhen CXL subsystem is auto-assembling a pmem region during cxl\\nendpoint port probing, always hit below calltrace.\\n\\n BUG: kernel NULL pointer dereference, address: 0000000000000078\\n #PF: supervisor read access in kernel mode\\n #PF: error_code(0x0000) - not-present page\\n RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\\n Call Trace:\\n  \u003cTASK\u003e\\n  ? __die+0x24/0x70\\n  ? page_fault_oops+0x82/0x160\\n  ? do_user_addr_fault+0x65/0x6b0\\n  ? exc_page_fault+0x7d/0x170\\n  ? asm_exc_page_fault+0x26/0x30\\n  ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]\\n  ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]\\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\\n  really_probe+0x173/0x410\\n  ? __pfx___device_attach_driver+0x10/0x10\\n  __driver_probe_device+0x80/0x170\\n  driver_probe_device+0x1e/0x90\\n  __device_attach_driver+0x90/0x120\\n  bus_for_each_drv+0x84/0xe0\\n  __device_attach+0xbc/0x1f0\\n  bus_probe_device+0x90/0xa0\\n  device_add+0x51c/0x710\\n  devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]\\n  cxl_bus_probe+0x1b/0x60 [cxl_core]\\n\\nThe cxl_nvd of the memdev needs to be available during the pmem region\\nprobe. Currently the cxl_nvd is registered after the endpoint port probe.\\nThe endpoint probe, in the case of autoassembly of regions, can cause a\\npmem region probe requiring the not yet available cxl_nvd. Adjust the\\nsequence so this dependency is met.\\n\\nThis requires adding a port parameter to cxl_find_nvdimm_bridge() that\\ncan be used to query the ancestor root port. The endpoint port is not\\nyet available, but will share a common ancestor with its parent, so\\nstart the query from there instead.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.8\", \"versionStartIncluding\": \"6.2\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"6.2\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-05-11T20:25:54.317Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-41085\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-11T20:25:54.317Z\", \"dateReserved\": \"2024-07-12T12:17:45.634Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-29T15:48:01.267Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…