Vulnerability identifier: #VU99847
Vulnerability risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-50101
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the domain_context_clear_one_cb() function in drivers/iommu/intel/iommu.c. A local user can perform a denial of service (DoS) attack.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/0bd9a30c22afb5da203386b811ec31429d2caa78
https://git.kernel.org/stable/c/cbfa3a83eba05240ce37839ed48280a05e8e8f6c
https://git.kernel.org/stable/c/fe2e0b6cd00abea3efac66de1da22d844364c1b0
https://git.kernel.org/stable/c/04d6826ba7ba81213422276e96c90c6565169e1c
https://git.kernel.org/stable/c/6e02a277f1db24fa039e23783c8921c7b0e5b1b3
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.