CVE-2024-35939

Source
https://cve.org/CVERecord?id=CVE-2024-35939
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35939.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35939
Downstream
Related
Published
2024-05-19T10:10:44.931Z
Modified
2026-03-14T12:34:05.437791Z
Summary
dma-direct: Leak pages on dma_set_decrypted() failure
Details

In the Linux kernel, the following vulnerability has been resolved:

dma-direct: Leak pages on dmasetdecrypted() failure

On TDX it is possible for the untrusted host to cause setmemoryencrypted() or setmemorydecrypted() to fail such that an error is returned and the resulting memory is shared. Callers need to take care to handle these errors to avoid returning decrypted (shared) memory to the page allocator, which could lead to functional or security issues.

DMA could free decrypted/shared pages if dmasetdecrypted() fails. This should be a rare case. Just leak the pages in this case instead of freeing them.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35939.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
56fccf21d1961a06e2a0c96ce446ebf036651062
Fixed
4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9
Fixed
4031b72ca747a1e6e9ae4fa729e765b43363d66a
Fixed
b57326c96b7bc7638aa8c44e12afa2defe0c934c
Fixed
b9fa16949d18e06bdf728a560f5c8af56d2bdcaf
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
91c7b0407ca6a62c095d265f76926b67bf66c026

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35939.json"