First published: Sat Jan 11 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request Bus cleanup path in DMA mode may trigger a RING_OP_STAT interrupt when the ring is being stopped. Depending on timing between ring stop request completion, interrupt handler removal and code execution this may lead to a NULL pointer dereference in hci_dma_irq_handler() if it gets to run after the io_data pointer is set to NULL in hci_dma_cleanup(). Prevent this my masking the ring interrupts before ring stop request.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.0<5.15.174 | |
Linux Kernel | >=5.16<6.1.120 | |
Linux Kernel | >=6.2<6.6.66 | |
Linux Kernel | >=6.7<6.12.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45828 has a severity rating that categorizes it based on the potential impact and exploitability.
To fix CVE-2024-45828, update your Linux kernel to the latest stable version that addresses this vulnerability.
CVE-2024-45828 affects Linux Kernel versions from 5.0 up to 6.12.5.
CVE-2024-45828 can affect the integrity and performance of the device by causing erroneous DMA behavior during ring operations.
Currently, the recommended action is to apply the available updates from your Linux distribution to mitigate CVE-2024-45828.