In the Linux kernel, the following vulnerability has been resolved:
iommu: sprd: Avoid NULL deref in sprdiommuhw_en
In sprdiommucleanup() before calling function sprdiommuhw_en() dom->sdev is equal to NULL, which leads to null dereference.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
[ { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5fe884ce28c5005f8582c35333c195a168f841c", "signature_version": "v1", "target": { "function": "sprd_iommu_cleanup", "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "function_hash": "245872113967368556813170764455744199954", "length": 264.0 }, "id": "CVE-2024-42277-01c754f5" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b62841e49a2b7938f6fdeaaf93fb57e4eb880bdb", "signature_version": "v1", "target": { "function": "sprd_iommu_cleanup", "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "function_hash": "245872113967368556813170764455744199954", "length": 264.0 }, "id": "CVE-2024-42277-1e41d9ea" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8c79ceb4ecf823e6ec10fee6febb0fca3de79922", "signature_version": "v1", "target": { "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "136894159518836989734257571941469055895", "225651155689574212105699620270123039652", "209062494189094701625576587276569891515", "238602134741821550085610997686410100930", "274227292922260187306386279094314572359" ] }, "id": "CVE-2024-42277-1e9284ee" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@8c79ceb4ecf823e6ec10fee6febb0fca3de79922", "signature_version": "v1", "target": { "function": "sprd_iommu_cleanup", "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "function_hash": "245872113967368556813170764455744199954", "length": 264.0 }, "id": "CVE-2024-42277-67b01a44" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b62841e49a2b7938f6fdeaaf93fb57e4eb880bdb", "signature_version": "v1", "target": { "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "136894159518836989734257571941469055895", "225651155689574212105699620270123039652", "209062494189094701625576587276569891515", "238602134741821550085610997686410100930", "274227292922260187306386279094314572359" ] }, "id": "CVE-2024-42277-80142574" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfe90030a0cfa26dca4cb6510de28920e5ad22fb", "signature_version": "v1", "target": { "function": "sprd_iommu_cleanup", "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "function_hash": "245872113967368556813170764455744199954", "length": 264.0 }, "id": "CVE-2024-42277-a07ab558" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfe90030a0cfa26dca4cb6510de28920e5ad22fb", "signature_version": "v1", "target": { "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "136894159518836989734257571941469055895", "225651155689574212105699620270123039652", "209062494189094701625576587276569891515", "238602134741821550085610997686410100930", "274227292922260187306386279094314572359" ] }, "id": "CVE-2024-42277-b14c621c" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@630482ee0653decf9e2482ac6181897eb6cde5b8", "signature_version": "v1", "target": { "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "136894159518836989734257571941469055895", "225651155689574212105699620270123039652", "209062494189094701625576587276569891515", "238602134741821550085610997686410100930", "274227292922260187306386279094314572359" ] }, "id": "CVE-2024-42277-cb8ec696" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@630482ee0653decf9e2482ac6181897eb6cde5b8", "signature_version": "v1", "target": { "function": "sprd_iommu_cleanup", "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "function_hash": "245872113967368556813170764455744199954", "length": 264.0 }, "id": "CVE-2024-42277-dba804cb" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d5fe884ce28c5005f8582c35333c195a168f841c", "signature_version": "v1", "target": { "file": "drivers/iommu/sprd-iommu.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "136894159518836989734257571941469055895", "225651155689574212105699620270123039652", "209062494189094701625576587276569891515", "238602134741821550085610997686410100930", "274227292922260187306386279094314572359" ] }, "id": "CVE-2024-42277-ed6c8338" } ]