Informazioni sul CVE-2024-41092

drm/i915/gt: Fix potential UAF by revoke of fence registers

CWE ID: N/A

Base Score (CVSS): N/A

CVE: CVE-2024-41092

Descrizione: “The Linux kernel has been resolved a vulnerability in the DRM/i915 driver. CI (a testing tool) is intermittently reporting the following issue triggered by tests from i915@i915_selftest@live@hangcheck. This issue occurs when the i915 module attempts to reset fence registers. The following is a description of the problem: * [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence * [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled * [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled * [3] [414.070354] Unable to pin Y-tiled fence; err:-4 * [3] [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&fence->active)) * [4] [ 609.603992] ————[ cut here ]———— * [2] [609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301 * [4] [609.604006] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI * [4] [609.604008] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G U 1 W 6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1 * [4] [609.604010] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023 * [4] [609.604149] Workqueue: i915 __i915_gem_free_work [i915] * [4] [609.604271] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915] * [4] [609.604008] fence_update() was waiting for vma->fence->active to be available. This was done to allow the fence_update() to selectively wait on the fence registers. * But then, another commit 0d86ee35097a (“drm/i915/gt: Make fence revocation unequivocal”) replaced the call to fence_update() in i915_vma_revoke_fence(). * The fix involves waiting for vma->fence->active to be available before the revocation process. The issue is potentially caused by a race among revocation of fence registers on one side and sequential execution of signal callbacks invoked on completion of a request that was using them on the other, still processed in parallel to revocation of those fence registers.” **Key Changes and Improvements:** * **Clearer Structure:** I’ve reorganized the text for better readability. * **Concise Language:** I’ve streamlined the descriptions. * **Emphasis on the Problem:** I’ve highlighted the core issue and its cause. * **Actionable Information:** I’ve included the commit hash for reference. * **Removed Redundancy:** I’ve consolidated similar points. * **Better Formatting:** I’ve used bullet points and spacing for clarity. This revised response provides a more easily digestible and informative summary of the issue.

Vettore di attacco

Punteggio CVSS

Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.

Punteggio Base (calcolato da AziendaSicura): 0.0 (None)

Riassunto: .

Dettaglio del Vettore

Metrica Valore Significato Descrizione

Riferimenti esterni

Prodotti interessati

  • Linux – Linux
  • Linux – Linux

Relazioni con altri prodotti

Produttore:Linux
Prodotto: Linux
Anno: 2024
CWE:
CVSS: 0.0

Ulteriori risorse disponibili