{
  "threat_severity" : "Moderate",
  "public_date" : "2024-05-30T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()",
    "id" : "2284269",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2284269"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-476",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\niommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()\nThis was missed because of the function pointer indirection.\nnvidia_smmu_context_fault() is also installed as a irq function, and the\n'void *' was changed to a struct arm_smmu_domain. Since the iommu_domain\nis embedded at a non-zero offset this causes nvidia_smmu_context_fault()\nto miscompute the offset. Fixup the types.\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000120\nMem abort info:\nESR = 0x0000000096000004\nEC = 0x25: DABT (current EL), IL = 32 bits\nSET = 0, FnV = 0\nEA = 0, S1PTW = 0\nFSC = 0x04: level 0 translation fault\nData abort info:\nISV = 0, ISS = 0x00000004, ISS2 = 0x00000000\nCM = 0, WnR = 0, TnD = 0, TagAccess = 0\nGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nuser pgtable: 4k pages, 48-bit VAs, pgdp=0000000107c9f000\n[0000000000000120] pgd=0000000000000000, p4d=0000000000000000\nInternal error: Oops: 0000000096000004 [#1] SMP\nModules linked in:\nCPU: 1 PID: 47 Comm: kworker/u25:0 Not tainted 6.9.0-0.rc7.58.eln136.aarch64 #1\nHardware name: Unknown NVIDIA Jetson Orin NX/NVIDIA Jetson Orin NX, BIOS 3.1-32827747 03/19/2023\nWorkqueue: events_unbound deferred_probe_work_func\npstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : nvidia_smmu_context_fault+0x1c/0x158\nlr : __free_irq+0x1d4/0x2e8\nsp : ffff80008044b6f0\nx29: ffff80008044b6f0 x28: ffff000080a60b18 x27: ffffd32b5172e970\nx26: 0000000000000000 x25: ffff0000802f5aac x24: ffff0000802f5a30\nx23: ffff0000802f5b60 x22: 0000000000000057 x21: 0000000000000000\nx20: ffff0000802f5a00 x19: ffff000087d4cd80 x18: ffffffffffffffff\nx17: 6234362066666666 x16: 6630303078302d30 x15: ffff00008156d888\nx14: 0000000000000000 x13: ffff0000801db910 x12: ffff00008156d6d0\nx11: 0000000000000003 x10: ffff0000801db918 x9 : ffffd32b50f94d9c\nx8 : 1fffe0001032fda1 x7 : ffff00008197ed00 x6 : 000000000000000f\nx5 : 000000000000010e x4 : 000000000000010e x3 : 0000000000000000\nx2 : ffffd32b51720cd8 x1 : ffff000087e6f700 x0 : 0000000000000057\nCall trace:\nnvidia_smmu_context_fault+0x1c/0x158\n__free_irq+0x1d4/0x2e8\nfree_irq+0x3c/0x80\ndevm_free_irq+0x64/0xa8\narm_smmu_domain_free+0xc4/0x158\niommu_domain_free+0x44/0xa0\niommu_deinit_device+0xd0/0xf8\n__iommu_group_remove_device+0xcc/0xe0\niommu_bus_notifier+0x64/0xa8\nnotifier_call_chain+0x78/0x148\nblocking_notifier_call_chain+0x4c/0x90\nbus_notify+0x44/0x70\ndevice_del+0x264/0x3e8\npci_remove_bus_device+0x84/0x120\npci_remove_root_bus+0x5c/0xc0\ndw_pcie_host_deinit+0x38/0xe0\ntegra_pcie_config_rp+0xc0/0x1f0\ntegra_pcie_dw_probe+0x34c/0x700\nplatform_probe+0x70/0xe8\nreally_probe+0xc8/0x3a0\n__driver_probe_device+0x84/0x160\ndriver_probe_device+0x44/0x130\n__device_attach_driver+0xc4/0x170\nbus_for_each_drv+0x90/0x100\n__device_attach+0xa8/0x1c8\ndevice_initial_probe+0x1c/0x30\nbus_probe_device+0xb0/0xc0\ndeferred_probe_work_func+0xbc/0x120\nprocess_one_work+0x194/0x490\nworker_thread+0x284/0x3b0\nkthread+0xf4/0x108\nret_from_fork+0x10/0x20\nCode: a9b97bfd 910003fd a9025bf5 f85a0035 (b94122a1)" ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-11-12T00:00:00Z",
    "advisory" : "RHSA-2024:9315",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-503.11.1.el9_5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2024-11-12T00:00:00Z",
    "advisory" : "RHSA-2024:9315",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-503.11.1.el9_5"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-36884\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-36884\nhttps://lore.kernel.org/linux-cve-announce/2024053032-CVE-2024-36884-c00b@gregkh/T" ],
  "name" : "CVE-2024-36884",
  "csaw" : false
}