• CVE-2024-42146

发布时间: 2024年8月28日

修改时间: 2024年12月14日

概要

In the Linux kernel, the following vulnerability has been resolved: drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf Any kunit doing any memory access should get their own runtime_pm outer references since they don't use the standard driver API entries. In special this dma_buf from the same driver. Found by pre-merge CI on adding WARN calls for unprotected inner callers: <6&gt; [318.639739] # xe_dma_buf_kunit: running xe_test_dmabuf_import_same_driver <4&gt; [318.639957] ------------[ cut here ]------------ <4&gt; [318.639967] xe 0000:4d:00.0: Missing outer runtime PM protection <4&gt; [318.640049] WARNING: CPU: 117 PID: 3832 at drivers/gpu/drm/xe/xe_pm.c:533 xe_pm_runtime_get_noresume+0x48/0x60 [xe]

CVSS v3 指标

NVD openEuler
Confidentiality None Low
Attack Vector Local Local
CVSS评分 5.5 3.9
Attack Complexity Low High
Privileges Required Low High
Scope Unchanged Unchanged
Integrity None Low
User Interaction None None
Availability High Low

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-3443 In the Linux kernel, the following vulnerability has been resolved: drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf Any kunit doing any memory access should get their own runtime_pm outer references since they don't use the standard driver API entries. In special this dma_buf from the same driver. Found by pre-merge CI on adding WARN calls for unprotected inner callers: <6&gt; [318.639739] # xe_dma_buf_kunit: running xe_test_dmabuf_import_same_driver <4&gt; [318.639957] ------------[ cut here ]------------ <4&gt; [318.639967] xe 0000:4d:00.0: Missing outer runtime PM protection <4&gt; [318.640049] WARNING: CPU: 117 PID: 3832 at drivers/gpu/drm/xe/xe_pm.c:533 xe_pm_runtime_get_noresume+0x48/0x60 [xe] 2024年8月28日

影响产品

产品 状态
KY3.4-5 kernel Unaffected
KY3.5.2 kernel Unaffected
KY3.5.3 kernel Unaffected
V6 kernel Unaffected