๐Ÿ” CVE Alert

CVE-2024-46761

UNKNOWN 0.0

pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv The hotplug driver for powerpc (pci/hotplug/pnv_php.c) causes a kernel crash when we try to hot-unplug/disable the PCIe switch/bridge from the PHB. The crash occurs because although the MSI data structure has been released during disable/hot-unplug path and it has been assigned with NULL, still during unregistration the code was again trying to explicitly disable the MSI which causes the NULL pointer dereference and kernel crash. The patch fixes the check during unregistration path to prevent invoking pci_disable_msi/msix() since its data structure is already freed.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 18, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
49f4b08e61547a5ccd2db551d994c4503efe5666 < 4eb4085c1346d19d4a05c55246eb93e74e671048 49f4b08e61547a5ccd2db551d994c4503efe5666 < c4c681999d385e28f84808bbf3a85ea8e982da55 49f4b08e61547a5ccd2db551d994c4503efe5666 < bc1faed19db95abf0933b104910a3fb01b138f59 49f4b08e61547a5ccd2db551d994c4503efe5666 < c0d8094dc740cfacf3775bbc6a1c4720459e8de4 49f4b08e61547a5ccd2db551d994c4503efe5666 < 438d522227374042b5c8798f8ce83bbe479dca4d 49f4b08e61547a5ccd2db551d994c4503efe5666 < b82d4d5c736f4fd2ed224c35f554f50d1953d21e 49f4b08e61547a5ccd2db551d994c4503efe5666 < bfc44075b19740d372f989f21dd03168bfda0689 49f4b08e61547a5ccd2db551d994c4503efe5666 < 335e35b748527f0c06ded9eebb65387f60647fda 1fb738a3dc1304250c755e5e31715137c1c44c50 bc4c9766324a7e9fda48de58691796430c8511bf
Linux / Linux
4.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4eb4085c1346d19d4a05c55246eb93e74e671048 git.kernel.org: https://git.kernel.org/stable/c/c4c681999d385e28f84808bbf3a85ea8e982da55 git.kernel.org: https://git.kernel.org/stable/c/bc1faed19db95abf0933b104910a3fb01b138f59 git.kernel.org: https://git.kernel.org/stable/c/c0d8094dc740cfacf3775bbc6a1c4720459e8de4 git.kernel.org: https://git.kernel.org/stable/c/438d522227374042b5c8798f8ce83bbe479dca4d git.kernel.org: https://git.kernel.org/stable/c/b82d4d5c736f4fd2ed224c35f554f50d1953d21e git.kernel.org: https://git.kernel.org/stable/c/bfc44075b19740d372f989f21dd03168bfda0689 git.kernel.org: https://git.kernel.org/stable/c/335e35b748527f0c06ded9eebb65387f60647fda lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html