U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-40945 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: iommu: Return right value in iommu_sva_bind_device() iommu_sva_bind_device() should return either a sva bond handle or an ERR_PTR value in error cases. Existing drivers (idxd and uacce) only check the return value with IS_ERR(). This could potentially lead to a kernel NULL pointer dereference issue if the function returns NULL instead of an error pointer. In reality, this doesn't cause any problems because iommu_sva_bind_device() only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA. In this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will return an error, and the device drivers won't call iommu_sva_bind_device() at all.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/2973b8e7d127754de9013177c41c0b5547406998 Patch 
https://git.kernel.org/stable/c/2973b8e7d127754de9013177c41c0b5547406998 Patch 
https://git.kernel.org/stable/c/61a96da9649a6b6a1a5d5bde9374b045fdb5c12e Patch 
https://git.kernel.org/stable/c/61a96da9649a6b6a1a5d5bde9374b045fdb5c12e Patch 
https://git.kernel.org/stable/c/6325eab6c108fed27f60ff51852e3eac0ba23f3f
https://git.kernel.org/stable/c/700f564758882db7c039dfba9443fe762561a3f8 Patch 
https://git.kernel.org/stable/c/700f564758882db7c039dfba9443fe762561a3f8 Patch 
https://git.kernel.org/stable/c/7388ae6f26c0ba95f70cc96bf9c5d5cb06c908b6 Patch 
https://git.kernel.org/stable/c/7388ae6f26c0ba95f70cc96bf9c5d5cb06c908b6 Patch 
https://git.kernel.org/stable/c/89e8a2366e3bce584b6c01549d5019c5cda1205e Patch 
https://git.kernel.org/stable/c/89e8a2366e3bce584b6c01549d5019c5cda1205e Patch 
https://git.kernel.org/stable/c/cf34f8f66982a36e5cba0d05781b21ec9606b91e Patch 
https://git.kernel.org/stable/c/cf34f8f66982a36e5cba0d05781b21ec9606b91e Patch 

Weakness Enumeration

CWE-ID CWE Name Source
CWE-476 NULL Pointer Dereference cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

4 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-40945
NVD Published Date:
07/12/2024
NVD Last Modified:
02/21/2025
Source:
kernel.org