{"vulnerability": "CVE-2024-56669", "sightings": [{"uuid": "1fa93093-0da4-44cb-91f3-d9ff4005623b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56669", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lecc2ruyjf2i", "content": "", "creation_timestamp": "2024-12-27T15:20:54.333271Z"}, {"uuid": "bbc907d2-8a02-41a3-bf37-add8907e34d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56669", "type": "seen", "source": "https://t.me/cvedetector/13772", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56669 - \"Intel IOMMU Use-After-Free\"\", \n  \"Content\": \"CVE ID : CVE-2024-56669 \nPublished : Dec. 27, 2024, 3:15 p.m. | 32\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \niommu/vt-d: Remove cache tags before disabling ATS  \n  \nThe current implementation removes cache tags after disabling ATS,  \nleading to potential memory leaks and kernel crashes. Specifically,  \nCACHE_TAG_DEVTLB type cache tags may still remain in the list even  \nafter the domain is freed, causing a use-after-free condition.  \n  \nThis issue really shows up when multiple VFs from different PFs  \npassed through to a single user-space process via vfio-pci. In such  \ncases, the kernel may crash with kernel messages like:  \n  \n BUG: kernel NULL pointer dereference, address: 0000000000000014  \n PGD 19036a067 P4D 1940a3067 PUD 136c9b067 PMD 0  \n Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI  \n CPU: 74 UID: 0 PID: 3183 Comm: testCli Not tainted 6.11.9 #2  \n RIP: 0010:cache_tag_flush_range+0x9b/0x250  \n Call Trace:  \n    \n  ? __die+0x1f/0x60  \n  ? page_fault_oops+0x163/0x590  \n  ? exc_page_fault+0x72/0x190  \n  ? asm_exc_page_fault+0x22/0x30  \n  ? cache_tag_flush_range+0x9b/0x250  \n  ? cache_tag_flush_range+0x5d/0x250  \n  intel_iommu_tlb_sync+0x29/0x40  \n  intel_iommu_unmap_pages+0xfe/0x160  \n  __iommu_unmap+0xd8/0x1a0  \n  vfio_unmap_unpin+0x182/0x340 [vfio_iommu_type1]  \n  vfio_remove_dma+0x2a/0xb0 [vfio_iommu_type1]  \n  vfio_iommu_type1_ioctl+0xafa/0x18e0 [vfio_iommu_type1]  \n  \nMove cache_tag_unassign_domain() before iommu_disable_pci_caps() to fix  \nit. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T16:51:05.000000Z"}]}