{"id":"CVE-2024-40945","summary":"iommu: Return right value in iommu_sva_bind_device()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\niommu: Return right value in iommu_sva_bind_device()\n\niommu_sva_bind_device() should return either a sva bond handle or an\nERR_PTR value in error cases. Existing drivers (idxd and uacce) only\ncheck the return value with IS_ERR(). This could potentially lead to\na kernel NULL pointer dereference issue if the function returns NULL\ninstead of an error pointer.\n\nIn reality, this doesn't cause any problems because iommu_sva_bind_device()\nonly returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.\nIn this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will\nreturn an error, and the device drivers won't call iommu_sva_bind_device()\nat all.","modified":"2026-04-02T12:17:21.813425Z","published":"2024-07-12T12:25:19.164Z","related":["SUSE-SU-2024:2894-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3383-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40945.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2973b8e7d127754de9013177c41c0b5547406998"},{"type":"WEB","url":"https://git.kernel.org/stable/c/61a96da9649a6b6a1a5d5bde9374b045fdb5c12e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6325eab6c108fed27f60ff51852e3eac0ba23f3f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/700f564758882db7c039dfba9443fe762561a3f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7388ae6f26c0ba95f70cc96bf9c5d5cb06c908b6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/89e8a2366e3bce584b6c01549d5019c5cda1205e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cf34f8f66982a36e5cba0d05781b21ec9606b91e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40945.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-40945"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"26b25a2b98e45aeb40eedcedc586ad5034cbd984"},{"fixed":"700f564758882db7c039dfba9443fe762561a3f8"},{"fixed":"cf34f8f66982a36e5cba0d05781b21ec9606b91e"},{"fixed":"2973b8e7d127754de9013177c41c0b5547406998"},{"fixed":"6325eab6c108fed27f60ff51852e3eac0ba23f3f"},{"fixed":"7388ae6f26c0ba95f70cc96bf9c5d5cb06c908b6"},{"fixed":"61a96da9649a6b6a1a5d5bde9374b045fdb5c12e"},{"fixed":"89e8a2366e3bce584b6c01549d5019c5cda1205e"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-40945.json"}}],"schema_version":"1.7.5"}