CVE-2024-26709: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach The function spapr_tce_platform_iommu_attach_dev() is missing to call iommu_group_put() when the domain is already set. This refcount leak shows up with BUG_ON() during DLPAR remove operation as: KernelBug: Kernel bug in state 'None': kernel BUG at arch/powerpc/platforms/pseries/iommu.c:100! Oops: Exception in kernel mode, sig: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries <snip> Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_016) hv:phyp pSeries NIP: c0000000000ff4d4 LR: c0000000000ff4cc CTR: 0000000000000000 REGS: c0000013aed5f840 TRAP: 0700 Tainted: G I (6.8.0-rc3-autotest-g99bd3cb0d12e) MSR: 8000000000029033 <SF,EE,ME,IR,DR,RI,LE> CR: 44002402 XER: 20040000 CFAR: c000000000a0d170 IRQMASK: 0 ... NIP iommu_reconfig_notifier+0x94/0x200 LR iommu_reconfig_notifier+0x8c/0x200 Call Trace: iommu_reconfig_notifier+0x8c/0x200 (unreliable) notifier_call_chain+0xb8/0x19c blocking_notifier_call_chain+0x64/0x98 of_reconfig_notify+0x44/0xdc of_detach_node+0x78/0xb0 ofdt_write.part.0+0x86c/0xbb8 proc_reg_write+0xf4/0x150 vfs_write+0xf8/0x488 ksys_write+0x84/0x140 system_call_exception+0x138/0x330 system_call_vectored_common+0x15c/0x2ec The patch adds the missing iommu_group_put() call.
AI Analysis
Technical Summary
CVE-2024-26709 is a vulnerability identified in the Linux kernel specifically affecting the PowerPC architecture's IOMMU (Input-Output Memory Management Unit) implementation. The issue arises from a missing call to iommu_group_put() within the function spapr_tce_platform_iommu_attach_dev() when the IOMMU domain is already set. This omission leads to a reference count leak. The consequence of this leak manifests during Dynamic Logical Partitioning (DLPAR) remove operations, triggering a kernel BUG_ON() and causing a kernel panic or oops. The vulnerability is evidenced by kernel crash logs showing a BUG at arch/powerpc/platforms/pseries/iommu.c:100, with stack traces pointing to iommu_reconfig_notifier and related kernel functions. The hardware affected includes IBM POWER10 systems running Linux kernels around version 6.8.0-rc3. The root cause is a missing decrement of the reference count on the iommu_group object, which leads to resource leaks and unstable kernel behavior during device detach or reconfiguration. The patch for this vulnerability involves adding the missing iommu_group_put() call to properly manage the reference count and prevent the kernel panic. This vulnerability is specific to the PowerPC platform and does not affect other architectures. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations utilizing IBM POWER10 hardware or other PowerPC-based systems running affected Linux kernel versions, this vulnerability can cause system instability or crashes during device reconfiguration or removal operations, particularly in environments using DLPAR. This can lead to unexpected downtime, impacting availability of critical services. Organizations relying on virtualization or partitioning features on PowerPC platforms may experience disruptions, potentially affecting data center operations or cloud services. While confidentiality and integrity impacts are minimal as this is primarily a stability issue, the availability impact can be significant in production environments. Since the vulnerability triggers kernel panics, it could also increase operational costs due to required reboots and troubleshooting. Given the niche hardware and architecture, the overall impact is limited to organizations with specific infrastructure but can be critical for those relying on these systems for mission-critical workloads.
Mitigation Recommendations
European organizations should promptly update their Linux kernels on PowerPC platforms to versions that include the patch fixing CVE-2024-26709. Specifically, ensure that kernel versions postdating the fix (after 6.8.0-rc3-autotest-g99bd3cb0d12e) are deployed. System administrators should audit their environments to identify any IBM POWER10 or similar PowerPC hardware running affected kernels. Testing kernel updates in staging environments before production rollout is recommended to avoid regressions. Additionally, monitoring kernel logs for BUG_ON or oops messages related to iommu_reconfig_notifier can help detect attempts to trigger the issue. Organizations using DLPAR or dynamic device reconfiguration should schedule maintenance windows to apply updates to minimize service disruption. As a longer-term mitigation, consider evaluating the necessity of PowerPC-based infrastructure and plan migration strategies if feasible, since this architecture is less common and may have fewer security updates compared to x86_64 platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2024-26709: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach The function spapr_tce_platform_iommu_attach_dev() is missing to call iommu_group_put() when the domain is already set. This refcount leak shows up with BUG_ON() during DLPAR remove operation as: KernelBug: Kernel bug in state 'None': kernel BUG at arch/powerpc/platforms/pseries/iommu.c:100! Oops: Exception in kernel mode, sig: 5 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries <snip> Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_016) hv:phyp pSeries NIP: c0000000000ff4d4 LR: c0000000000ff4cc CTR: 0000000000000000 REGS: c0000013aed5f840 TRAP: 0700 Tainted: G I (6.8.0-rc3-autotest-g99bd3cb0d12e) MSR: 8000000000029033 <SF,EE,ME,IR,DR,RI,LE> CR: 44002402 XER: 20040000 CFAR: c000000000a0d170 IRQMASK: 0 ... NIP iommu_reconfig_notifier+0x94/0x200 LR iommu_reconfig_notifier+0x8c/0x200 Call Trace: iommu_reconfig_notifier+0x8c/0x200 (unreliable) notifier_call_chain+0xb8/0x19c blocking_notifier_call_chain+0x64/0x98 of_reconfig_notify+0x44/0xdc of_detach_node+0x78/0xb0 ofdt_write.part.0+0x86c/0xbb8 proc_reg_write+0xf4/0x150 vfs_write+0xf8/0x488 ksys_write+0x84/0x140 system_call_exception+0x138/0x330 system_call_vectored_common+0x15c/0x2ec The patch adds the missing iommu_group_put() call.
AI-Powered Analysis
Technical Analysis
CVE-2024-26709 is a vulnerability identified in the Linux kernel specifically affecting the PowerPC architecture's IOMMU (Input-Output Memory Management Unit) implementation. The issue arises from a missing call to iommu_group_put() within the function spapr_tce_platform_iommu_attach_dev() when the IOMMU domain is already set. This omission leads to a reference count leak. The consequence of this leak manifests during Dynamic Logical Partitioning (DLPAR) remove operations, triggering a kernel BUG_ON() and causing a kernel panic or oops. The vulnerability is evidenced by kernel crash logs showing a BUG at arch/powerpc/platforms/pseries/iommu.c:100, with stack traces pointing to iommu_reconfig_notifier and related kernel functions. The hardware affected includes IBM POWER10 systems running Linux kernels around version 6.8.0-rc3. The root cause is a missing decrement of the reference count on the iommu_group object, which leads to resource leaks and unstable kernel behavior during device detach or reconfiguration. The patch for this vulnerability involves adding the missing iommu_group_put() call to properly manage the reference count and prevent the kernel panic. This vulnerability is specific to the PowerPC platform and does not affect other architectures. No known exploits are reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations utilizing IBM POWER10 hardware or other PowerPC-based systems running affected Linux kernel versions, this vulnerability can cause system instability or crashes during device reconfiguration or removal operations, particularly in environments using DLPAR. This can lead to unexpected downtime, impacting availability of critical services. Organizations relying on virtualization or partitioning features on PowerPC platforms may experience disruptions, potentially affecting data center operations or cloud services. While confidentiality and integrity impacts are minimal as this is primarily a stability issue, the availability impact can be significant in production environments. Since the vulnerability triggers kernel panics, it could also increase operational costs due to required reboots and troubleshooting. Given the niche hardware and architecture, the overall impact is limited to organizations with specific infrastructure but can be critical for those relying on these systems for mission-critical workloads.
Mitigation Recommendations
European organizations should promptly update their Linux kernels on PowerPC platforms to versions that include the patch fixing CVE-2024-26709. Specifically, ensure that kernel versions postdating the fix (after 6.8.0-rc3-autotest-g99bd3cb0d12e) are deployed. System administrators should audit their environments to identify any IBM POWER10 or similar PowerPC hardware running affected kernels. Testing kernel updates in staging environments before production rollout is recommended to avoid regressions. Additionally, monitoring kernel logs for BUG_ON or oops messages related to iommu_reconfig_notifier can help detect attempts to trigger the issue. Organizations using DLPAR or dynamic device reconfiguration should schedule maintenance windows to apply updates to minimize service disruption. As a longer-term mitigation, consider evaluating the necessity of PowerPC-based infrastructure and plan migration strategies if feasible, since this architecture is less common and may have fewer security updates compared to x86_64 platforms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.159Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe38be
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 5:41:31 PM
Last updated: 8/14/2025, 6:30:50 PM
Views: 19
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.