CVE-2024-26713 
                        Detail
                     
                    
                    
                        
                            
                                
                                    Rejected  
                                     
                                    This CVE has been marked Rejected in the CVE List. These CVEs are stored in the NVD, but do not show up in search results by default.
                                 
                             
                            Description  
                            
                            Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
                            
                            
                            
                            
                                Metrics 
                                 
                                
                                    CVSS Version 4.0
                                     
                                    CVSS Version 3.x
                                     
                                    CVSS Version 2.0
                                     
                                
                                
                                    
                                        
                                            NVD enrichment efforts reference publicly available information to associate
                                            vector strings. CVSS information contributed by other sources is also
                                            displayed.
                                         
                                     
                                
                                
                                
                                    CVSS 4.0 Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
                                       
                                             NVD assessment
                                       not yet provided.    
                                        
                                     
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 3.x Severity and Vector Strings: 
                                    
                                    
                                        
                                        
                                        
                                        
												
                                             NVD assessment
														not yet provided.    
                                        
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                                
                                
                                    CVSS 2.0 Severity and Vector Strings:   
                                    
                                    
                                        
                                        
                                        
												 NVD assessment
														not yet provided.    
                                        
                                     
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                    
                                 
                             
                            
                                
                                
                                
                                
                                    References to Advisories, Solutions, and Tools 
                                    
                                        By selecting these links, you will be leaving NIST webspace.
                                        We have provided these links to other web sites because they
                                        may have information that would be of interest to you. No
                                        inferences should be drawn on account of other sites being
                                        referenced, or not, from this page. There may be other web
                                        sites that are more appropriate for your purpose. NIST does
                                        not necessarily endorse the views expressed, or concur with
                                        the facts presented on these sites. Further, NIST does not
                                        endorse any commercial products that may be mentioned on
                                        these sites. Please address comments about this page to [email protected]  .
                                    
                                    
                                 
                                
                                
                                
                                
                                    Change History 
                                     6 change records found show changes 
                                     
                                    
	
		
			 
			
				CVE Modified by kernel.org  12/19/2024 7:15:06 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Changed 
						Description 
						
							
							
							
								
								Record truncated, showing 2048 of 2980 characters.   
								
                             View Entire Change Record  
								In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add
When a PCI device is dynamically added, the kernel oopses with a NULL
pointer dereference:
  BUG: Kernel NULL pointer dereference on read at 0x00000030
  Faulting instruction address: 0xc0000000006bbe5c
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs xsk_diag bonding nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5_ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod fuse
  CPU: 17 PID: 2685 Comm: drmgr Not tainted 6.7.0-203405+ #66
  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries
  NIP:  c0000000006bbe5c LR: c000000000a13e68 CTR: c0000000000579f8
  REGS: c00000009924f240 TRAP: 0300   Not tainted  (6.7.0-203405+)
  MSR:  8000000000009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 24002220  XER: 20040006
  CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0
  ...
  NIP sysfs_add_link_to_group+0x34/0x94
  LR  iommu_device_link+0x5c/0x118
  Call Trace:
   iommu_init_device+0x26c/0x318 (unreliable)
   iommu_device_link+0x5c/0x118
   iommu_init_device+0xa8/0x318
   iommu_probe_device+0xc0/0x134
   iommu_bus_notifier+0x44/0x104
   notifier_call_chain+0xb8/0x19c
   blocking_notifier_call_chain+0x64/0x98
   bus_notify+0x50/0x7c
   device_add+0x640/0x918
   pci_device_add+0x23c/0x298
   of_create_pci_dev+0x400/0x884
   of_scan_pci_dev+0x124/0x1b0
   __of_scan_bus+0x78/0x18c
   pcibios_scan_phb+0x2a4/0x3b0
   init_phb_dyn 
								
								
							
							
						 
							
						
							
								Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. 
								  
								
                              
								
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								CVE: https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								CVE: https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								CVE: https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org: https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org: https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
					
						Removed 
						Reference 
						
							
							
							
								kernel.org: https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8 
								  
								
                              
								
								
								
							
							
						 
							
						
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Rejected by kernel.org  12/19/2024 7:15:06 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				CVE Modified by CVE  11/21/2024 4:02:54 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8 
								  
								
                              
								
								
								
						 
					 
				 
			
		 
	
		
			 
			
				CVE Modified by kernel.org  5/29/2024 2:16:56 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				CVE Modified by kernel.org  5/14/2024 11:09:52 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
				 
			
		 
	
		
			 
			
				New CVE Received from kernel.org  4/03/2024 11:15:53 AM  
			 
			
				 
					
						Action 
						Type 
						Old Value 
						New Value 
					 
				 
				
					
						Added 
						Description 
						
							
							
								
								
							
							
						 
							
						
							
								
								Record truncated, showing 2048 of 2980 characters.   
								
                             View Entire Change Record  
								In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add
When a PCI device is dynamically added, the kernel oopses with a NULL
pointer dereference:
  BUG: Kernel NULL pointer dereference on read at 0x00000030
  Faulting instruction address: 0xc0000000006bbe5c
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs xsk_diag bonding nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5_ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod fuse
  CPU: 17 PID: 2685 Comm: drmgr Not tainted 6.7.0-203405+ #66
  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries
  NIP:  c0000000006bbe5c LR: c000000000a13e68 CTR: c0000000000579f8
  REGS: c00000009924f240 TRAP: 0300   Not tainted  (6.7.0-203405+)
  MSR:  8000000000009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 24002220  XER: 20040006
  CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0
  ...
  NIP sysfs_add_link_to_group+0x34/0x94
  LR  iommu_device_link+0x5c/0x118
  Call Trace:
   iommu_init_device+0x26c/0x318 (unreliable)
   iommu_device_link+0x5c/0x118
   iommu_init_device+0xa8/0x318
   iommu_probe_device+0xc0/0x134
   iommu_bus_notifier+0x44/0x104
   notifier_call_chain+0xb8/0x19c
   blocking_notifier_call_chain+0x64/0x98
   bus_notify+0x50/0x7c
   device_add+0x640/0x918
   pci_device_add+0x23c/0x298
   of_create_pci_dev+0x400/0x884
   of_scan_pci_dev+0x124/0x1b0
   __of_scan_bus+0x78/0x18c
   pcibios_scan_phb+0x2a4/0x3b0
   init_phb_dyn 
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753 [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d [No types assigned] 
								  
								
                              
								
								
								
						 
					 
					
						Added 
						Reference 
						
							
							
								
								
							
							
						 
							
						
							
								kernel.org https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8 [No types assigned] 
								  
								
                              
								
								
								
						 
					 
				 
			
		  
	 
                                 
                             
                         
                        
                            
                                Quick Info 
                                CVE Dictionary Entry:  CVE-2024-26713  NVD
                                Published Date:  04/03/2024  NVD
                                Last Modified:  12/19/2024  
                                Source:  kernel.org