SB20240531499 - NULL pointer dereference in Linux kernel include asm
Published: May 31, 2024 Updated: May 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2024-26738)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the init_phb_dynamic() and remove_phb_dynamic() functions in arch/powerpc/platforms/pseries/pci_dlpar.c, within the spapr_tce_iommu_probe_device(), ppc_iommu_register_device() and spapr_tce_setup_phb_iommus_initcall() functions in arch/powerpc/kernel/iommu.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/b8315b2e25b4e68e42fcb74630f824b9a5067765
- https://git.kernel.org/stable/c/46e36ebd5e00a148b67ed77c1d31675996f77c25
- https://git.kernel.org/stable/c/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.19
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.7.7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8