CVE-2024-50101

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-50101
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-50101.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-50101
Downstream
Related
Published
2024-11-05T17:07:38Z
Modified
2025-10-17T15:51:46.130803Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices
Details

In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix incorrect pciforeachdmaalias() for non-PCI devices

Previously, the domaincontextclear() function incorrectly called pciforeachdmaalias() to set up context entries for non-PCI devices. This could lead to kernel hangs or other unexpected behavior.

Add a check to only call pciforeachdmaalias() for PCI devices. For non-PCI devices, domaincontextclear_one() is called directly.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9807860f6ad446459d0446550cf4a2dc23bbee6c
Fixed
0bd9a30c22afb5da203386b811ec31429d2caa78
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
59862b869275c27beb25cda2054b59a8b5d04970
Fixed
cbfa3a83eba05240ce37839ed48280a05e8e8f6c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
48f2183a4f9d3540fc5cfc8f8451621ee92c09f8
Fixed
fe2e0b6cd00abea3efac66de1da22d844364c1b0
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9a16ab9d640274b20813d2d17475e18d3e99d834
Fixed
04d6826ba7ba81213422276e96c90c6565169e1c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9a16ab9d640274b20813d2d17475e18d3e99d834
Fixed
6e02a277f1db24fa039e23783c8921c7b0e5b1b3

Affected versions

v5.*

v5.15.142
v5.15.143
v5.15.144
v5.15.145
v5.15.146
v5.15.147
v5.15.148
v5.15.149
v5.15.150
v5.15.151
v5.15.152
v5.15.153
v5.15.154
v5.15.155
v5.15.156
v5.15.157
v5.15.158
v5.15.159
v5.15.160
v5.15.161
v5.15.162
v5.15.163
v5.15.164
v5.15.165
v5.15.166
v5.15.167
v5.15.168

v6.*

v6.1.100
v6.1.101
v6.1.102
v6.1.103
v6.1.104
v6.1.105
v6.1.106
v6.1.107
v6.1.108
v6.1.109
v6.1.110
v6.1.111
v6.1.112
v6.1.113
v6.1.66
v6.1.67
v6.1.68
v6.1.69
v6.1.70
v6.1.71
v6.1.72
v6.1.73
v6.1.74
v6.1.75
v6.1.76
v6.1.77
v6.1.78
v6.1.79
v6.1.80
v6.1.81
v6.1.82
v6.1.83
v6.1.84
v6.1.85
v6.1.86
v6.1.87
v6.1.88
v6.1.89
v6.1.90
v6.1.91
v6.1.92
v6.1.93
v6.1.94
v6.1.95
v6.1.96
v6.1.97
v6.1.98
v6.1.99
v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.24
v6.6.25
v6.6.26
v6.6.27
v6.6.28
v6.6.29
v6.6.30
v6.6.31
v6.6.32
v6.6.33
v6.6.34
v6.6.35
v6.6.36
v6.6.37
v6.6.38
v6.6.39
v6.6.40
v6.6.41
v6.6.42
v6.6.43
v6.6.44
v6.6.45
v6.6.46
v6.6.47
v6.6.48
v6.6.49
v6.6.5
v6.6.50
v6.6.51
v6.6.52
v6.6.53
v6.6.54
v6.6.55
v6.6.56
v6.6.57
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "id": "CVE-2024-50101-103da20c",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "drivers/iommu/intel/iommu.c",
            "function": "domain_context_clear"
        },
        "digest": {
            "function_hash": "261150929723674896765987957316101521640",
            "length": 212.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cbfa3a83eba05240ce37839ed48280a05e8e8f6c"
    },
    {
        "id": "CVE-2024-50101-205c856c",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "drivers/iommu/intel/iommu.c",
            "function": "domain_context_clear"
        },
        "digest": {
            "function_hash": "261150929723674896765987957316101521640",
            "length": 212.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bd9a30c22afb5da203386b811ec31429d2caa78"
    },
    {
        "id": "CVE-2024-50101-2d686120",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        },
        "digest": {
            "line_hashes": [
                "3917989307100060661247002830450174987",
                "69473650604117485806398574275100380420",
                "268296964545365760078940523910686627822",
                "326879980866211863526933251123635766746",
                "34582146020444710684841480526666101132"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@cbfa3a83eba05240ce37839ed48280a05e8e8f6c"
    },
    {
        "id": "CVE-2024-50101-44216297",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        },
        "digest": {
            "line_hashes": [
                "3917989307100060661247002830450174987",
                "69473650604117485806398574275100380420",
                "268296964545365760078940523910686627822",
                "326879980866211863526933251123635766746",
                "34582146020444710684841480526666101132"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0bd9a30c22afb5da203386b811ec31429d2caa78"
    },
    {
        "id": "CVE-2024-50101-65aed133",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "drivers/iommu/intel/iommu.c",
            "function": "domain_context_clear"
        },
        "digest": {
            "function_hash": "261150929723674896765987957316101521640",
            "length": 212.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04d6826ba7ba81213422276e96c90c6565169e1c"
    },
    {
        "id": "CVE-2024-50101-70a917fe",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        },
        "digest": {
            "line_hashes": [
                "3917989307100060661247002830450174987",
                "69473650604117485806398574275100380420",
                "268296964545365760078940523910686627822",
                "326879980866211863526933251123635766746",
                "34582146020444710684841480526666101132"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e02a277f1db24fa039e23783c8921c7b0e5b1b3"
    },
    {
        "id": "CVE-2024-50101-806d5cd8",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        },
        "digest": {
            "line_hashes": [
                "3917989307100060661247002830450174987",
                "69473650604117485806398574275100380420",
                "268296964545365760078940523910686627822",
                "326879980866211863526933251123635766746",
                "34582146020444710684841480526666101132"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@04d6826ba7ba81213422276e96c90c6565169e1c"
    },
    {
        "id": "CVE-2024-50101-9e5b8a25",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "drivers/iommu/intel/iommu.c"
        },
        "digest": {
            "line_hashes": [
                "3917989307100060661247002830450174987",
                "69473650604117485806398574275100380420",
                "268296964545365760078940523910686627822",
                "326879980866211863526933251123635766746",
                "34582146020444710684841480526666101132"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe2e0b6cd00abea3efac66de1da22d844364c1b0"
    },
    {
        "id": "CVE-2024-50101-a28052fd",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "drivers/iommu/intel/iommu.c",
            "function": "domain_context_clear"
        },
        "digest": {
            "function_hash": "261150929723674896765987957316101521640",
            "length": 212.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6e02a277f1db24fa039e23783c8921c7b0e5b1b3"
    },
    {
        "id": "CVE-2024-50101-fe156191",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "drivers/iommu/intel/iommu.c",
            "function": "domain_context_clear"
        },
        "digest": {
            "function_hash": "261150929723674896765987957316101521640",
            "length": 212.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@fe2e0b6cd00abea3efac66de1da22d844364c1b0"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.169
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.114
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.58
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.5