CVE-2024-45828
Published: January 13, 2025Last modified: January 13, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request Bus cleanup path in DMA mode may trigger a RING_OP_STAT interrupt when the ring is being stopped. Depending on timing between ring stop request completion, interrupt handler removal and code execution this may lead to a NULL pointer dereference in hci_dma_irq_handler() if it gets to run after the io_data pointer is set to NULL in hci_dma_cleanup(). Prevent this my masking the ring interrupts before ring stop request.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack Vector | LOCAL |
Attack complexity | LOW |
Privileges required | LOW |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.120-r0) |
Stream | linux-lts | Fixed (6.6.66-r0) |
References
- https://git.kernel.org/stable/c/19cc5767334bfe980f52421627d0826c0da86721
- https://git.kernel.org/stable/c/6ca2738174e4ee44edb2ab2d86ce74f015a0cc32
- https://git.kernel.org/stable/c/9d745a56aea45e47f4755bc12e6429d6314dbb54
- https://git.kernel.org/stable/c/a6cddf68b3405b272b5a3cad9657be0b02b34bf4
- https://git.kernel.org/stable/c/a6dc4b4fda2e147e557050eaae51ff15edeb680b