[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2024092753-CVE-2024-46837-c69f@gregkh>
Date: Fri, 27 Sep 2024 14:40:05 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: CVE-2024-46837: drm/panthor: Restrict high priorities on group_create
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
drm/panthor: Restrict high priorities on group_create
We were allowing any users to create a high priority group without any
permission checks. As a result, this was allowing possible denial of
service.
We now only allow the DRM master or users with the CAP_SYS_NICE
capability to set higher priorities than PANTHOR_GROUP_PRIORITY_MEDIUM.
As the sole user of that uAPI lives in Mesa and hardcode a value of
MEDIUM [1], this should be safe to do.
Additionally, as those checks are performed at the ioctl level,
panthor_group_create now only check for priority level validity.
[1]https://gitlab.freedesktop.org/mesa/mesa/-/blob/f390835074bdf162a63deb0311d1a6de527f9f89/src/gallium/drivers/panfrost/pan_csf.c#L1038
The Linux kernel CVE team has assigned CVE-2024-46837 to this issue.
Affected and fixed versions
===========================
Issue introduced in 6.10 with commit de8548813824 and fixed in 6.10.10 with commit 33eb0344e186
Issue introduced in 6.10 with commit de8548813824 and fixed in 6.11 with commit 5f7762042f8a
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2024-46837
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/gpu/drm/panthor/panthor_drv.c
drivers/gpu/drm/panthor/panthor_sched.c
include/uapi/drm/panthor_drm.h
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/33eb0344e186a2bcc257c6c5a6e65c1cb42adb4a
https://git.kernel.org/stable/c/5f7762042f8a5377bd8a32844db353c0311a7369
Powered by blists - more mailing lists