CVE-2024-35957

5.5 MEDIUM

📋 TL;DR

A Linux kernel vulnerability in the Intel VT-d iommu driver causes a WARN_ON kernel warning and potential iommu probe failure when devices with duplicate source IDs are encountered. This affects systems using Intel VT-d hardware with the vulnerable kernel versions. The issue can prevent proper device initialization and cause system instability.

💻 Affected Systems

Products:
  • Linux kernel with Intel VT-d iommu driver
Versions: Kernel versions containing commit 1a75cc710b95 up to fixes in commits 89436f4f5412 and fba8ca3e6f60
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Intel VT-d hardware and iommu enabled. Requires devices with duplicate source IDs to trigger.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

System crash or failure to initialize devices, leading to denial of service and potential data loss if critical devices fail to probe.

🟠

Likely Case

Kernel warning messages and potential failure of iommu device probing, causing some PCI devices to not function properly.

🟢

If Mitigated

Minor performance impact from WARN_ON messages but system remains operational.

🌐 Internet-Facing: LOW - This is a local kernel driver issue not directly exploitable over network.
🏢 Internal Only: MEDIUM - Affects system stability and device initialization on vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: HIGH

This is a reliability bug, not a security vulnerability with traditional exploitation. Triggering requires specific hardware configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel commits 89436f4f54125b1297aec1f466efd8acb4ec613d and fba8ca3e6f608b92e54271fdbd3ce569361939fc

Vendor Advisory: https://git.kernel.org/stable/c/89436f4f54125b1297aec1f466efd8acb4ec613d

Restart Required: Yes

Instructions:

1. Update to kernel version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable iommu for VT-d

linux

Add kernel boot parameter to disable Intel VT-d iommu

Add 'intel_iommu=off' to kernel boot parameters in GRUB configuration

Disable ATS capability

linux

Prevent devices from using PCI ATS features

Add 'pci=noats' to kernel boot parameters

🧯 If You Can't Patch

  • Avoid using systems with Intel VT-d hardware that triggers duplicate source IDs
  • Monitor kernel logs for WARN_ON messages and be prepared for potential device initialization failures

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if WARN_ON messages appear in dmesg related to intel_iommu_probe_device

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and no WARN_ON messages appear during boot

📡 Detection & Monitoring

Log Indicators:

  • WARNING: CPU: ... at drivers/iommu/intel/iommu.c:158 intel_iommu_probe_device
  • Kernel splat with call trace showing intel_iommu_probe_device

Network Indicators:

  • None - local kernel issue

SIEM Query:

source="kernel" AND "intel_iommu_probe_device" AND "WARNING"

🔗 References

📤 Share & Export