Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42146— drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-42146

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf Any kunit doing any memory access should get their own runtime_pm outer references since they don't use the standard driver API entries. In special this dma_buf from the same driver. Found by pre-merge CI on adding WARN calls for unprotected inner callers: <6> [318.639739] # xe_dma_buf_kunit: running xe_test_dmabuf_import_same_driver <4> [318.639957] ------------[ cut here ]------------ <4> [318.639967] xe 0000:4d:00.0: Missing outer runtime PM protection <4> [318.640049] WARNING: CPU: 117 PID: 3832 at drivers/gpu/drm/xe/xe_pm.c:533 xe_pm_runtime_get_noresume+0x48/0x60 [xe]
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel 存在安全漏洞,该漏洞源于drm/xe模块中在使用dma_buf进行内存访问的任何kunit都应该获得自己的runtime_pm外部引用,以避免未受保护的内部调用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux dd08ebf6c3525a7ea2186e636df064ea47281987 ~ 0888d15ea45ba8ef4508edd1123ea5ad95b58994 -
LinuxLinux 6.8 -

II. Public POCs for CVE-2024-42146

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-42146

登录查看更多情报信息。

Same Patch Batch · Linux · 2024-07-30 · 70 CVEs total

CVE-2024-42145IB/core: Implement a limit on UMAD receive List
CVE-2024-42227drm/amd/display: Fix overlapping copy within dml_core_mode_programming
CVE-2024-42225wifi: mt76: replace skb_put with skb_put_zero
CVE-2024-42153i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr
CVE-2024-42152nvmet: fix a possible leak when destroy a ctrl during qp establishment
CVE-2024-42151bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable
CVE-2024-42150net: txgbe: remove separate irq request for MSI and INTx
CVE-2024-42149fs: don't misleadingly warn during thaw operations
CVE-2024-42148bnx2x: Fix multiple UBSAN array-index-out-of-bounds
CVE-2024-42147crypto: hisilicon/debugfs - Fix debugfs uninit process issue
CVE-2024-42154tcp_metrics: validate source addr length
CVE-2024-42144thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data
CVE-2024-42142net/mlx5: E-switch, Create ingress ACL when needed
CVE-2024-42141Bluetooth: ISO: Check socket flag instead of hcon
CVE-2024-42140riscv: kexec: Avoid deadlock in kexec crash path
CVE-2024-42138mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
CVE-2024-42139ice: Fix improper extts handling
CVE-2024-42137Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot
CVE-2024-42136cdrom: rearrange last_media_change check to avoid unintentional overflow
CVE-2024-42135vhost_task: Handle SIGKILL by flushing work and exiting

Showing top 20 of 70 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2024-42146

No comments yet


Leave a comment