Skip to main content

CVE-2024-26709: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-26709cvecve-2024-26709
Published: Wed Apr 03 2024 (04/03/2024, 14:55:11 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach The function spapr_tce_platform_iommu_attach_dev() is missing to call iommu_group_put() when the domain is already set. This refcount leak shows up with BUG_ON() during DLPAR remove operation as: KernelBug: Kernel bug in state 'None': kernel BUG at arch/powerpc/platforms/pseries/iommu.c:100! Oops: Exception in kernel mode, sig: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries <snip> Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_016) hv:phyp pSeries NIP: c0000000000ff4d4 LR: c0000000000ff4cc CTR: 0000000000000000 REGS: c0000013aed5f840 TRAP: 0700 Tainted: G I (6.8.0-rc3-autotest-g99bd3cb0d12e) MSR: 8000000000029033 <SF,EE,ME,IR,DR,RI,LE> CR: 44002402 XER: 20040000 CFAR: c000000000a0d170 IRQMASK: 0 ... NIP iommu_reconfig_notifier+0x94/0x200 LR iommu_reconfig_notifier+0x8c/0x200 Call Trace: iommu_reconfig_notifier+0x8c/0x200 (unreliable) notifier_call_chain+0xb8/0x19c blocking_notifier_call_chain+0x64/0x98 of_reconfig_notify+0x44/0xdc of_detach_node+0x78/0xb0 ofdt_write.part.0+0x86c/0xbb8 proc_reg_write+0xf4/0x150 vfs_write+0xf8/0x488 ksys_write+0x84/0x140 system_call_exception+0x138/0x330 system_call_vectored_common+0x15c/0x2ec The patch adds the missing iommu_group_put() call.

AI-Powered Analysis

AILast updated: 06/29/2025, 17:41:31 UTC

Technical Analysis

CVE-2024-26709 is a vulnerability identified in the Linux kernel specifically affecting the PowerPC architecture's IOMMU (Input-Output Memory Management Unit) implementation. The issue arises from a missing call to iommu_group_put() within the function spapr_tce_platform_iommu_attach_dev() when the IOMMU domain is already set. This omission leads to a reference count leak. The consequence of this leak manifests during Dynamic Logical Partitioning (DLPAR) remove operations, triggering a kernel BUG_ON() and causing a kernel panic or oops. The vulnerability is evidenced by kernel crash logs showing a BUG at arch/powerpc/platforms/pseries/iommu.c:100, with stack traces pointing to iommu_reconfig_notifier and related kernel functions. The hardware affected includes IBM POWER10 systems running Linux kernels around version 6.8.0-rc3. The root cause is a missing decrement of the reference count on the iommu_group object, which leads to resource leaks and unstable kernel behavior during device detach or reconfiguration. The patch for this vulnerability involves adding the missing iommu_group_put() call to properly manage the reference count and prevent the kernel panic. This vulnerability is specific to the PowerPC platform and does not affect other architectures. No known exploits are reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations utilizing IBM POWER10 hardware or other PowerPC-based systems running affected Linux kernel versions, this vulnerability can cause system instability or crashes during device reconfiguration or removal operations, particularly in environments using DLPAR. This can lead to unexpected downtime, impacting availability of critical services. Organizations relying on virtualization or partitioning features on PowerPC platforms may experience disruptions, potentially affecting data center operations or cloud services. While confidentiality and integrity impacts are minimal as this is primarily a stability issue, the availability impact can be significant in production environments. Since the vulnerability triggers kernel panics, it could also increase operational costs due to required reboots and troubleshooting. Given the niche hardware and architecture, the overall impact is limited to organizations with specific infrastructure but can be critical for those relying on these systems for mission-critical workloads.

Mitigation Recommendations

European organizations should promptly update their Linux kernels on PowerPC platforms to versions that include the patch fixing CVE-2024-26709. Specifically, ensure that kernel versions postdating the fix (after 6.8.0-rc3-autotest-g99bd3cb0d12e) are deployed. System administrators should audit their environments to identify any IBM POWER10 or similar PowerPC hardware running affected kernels. Testing kernel updates in staging environments before production rollout is recommended to avoid regressions. Additionally, monitoring kernel logs for BUG_ON or oops messages related to iommu_reconfig_notifier can help detect attempts to trigger the issue. Organizations using DLPAR or dynamic device reconfiguration should schedule maintenance windows to apply updates to minimize service disruption. As a longer-term mitigation, consider evaluating the necessity of PowerPC-based infrastructure and plan migration strategies if feasible, since this architecture is less common and may have fewer security updates compared to x86_64 platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.159Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe38be

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 5:41:31 PM

Last updated: 8/14/2025, 6:30:50 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats