• 公告ID (KylinSec-SA-2024-2054)

摘要:

In the Linux kernel, the following vulnerability has been resolved:drm/nouveau: fix several DMA buffer leaksNouveau manages GSP-RM DMA buffers with nvkm_gsp_mem objects. Several ofthese buffers are never dealloced. Some of them can be deallocatedright after GSP-RM is initialized, but the rest need to stay until thedriver unloads.Also futher bullet-proof these objects by poisoning the buffer andclearing the nvkm_gsp_mem object when it is deallocated. Poisoningthe buffer should trigger an error (or crash) from GSP-RM if it triesto access the buffer after we ve deallocated it, because we were wrongabout when it is safe to deallocate.Finally, change the mem->size field to a size_t because that s the sametype that dma_alloc_coherent expects.

安全等级: Low

公告ID: KylinSec-SA-2024-2054

发布日期: 2024年5月27日

关联CVE: CVE-2024-26912  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:drm/nouveau: fix several DMA buffer leaksNouveau manages GSP-RM DMA buffers with nvkm_gsp_mem objects. Several ofthese buffers are never dealloced. Some of them can be deallocatedright after GSP-RM is initialized, but the rest need to stay until thedriver unloads.Also futher bullet-proof these objects by poisoning the buffer andclearing the nvkm_gsp_mem object when it is deallocated. Poisoningthe buffer should trigger an error (or crash) from GSP-RM if it triesto access the buffer after we ve deallocated it, because we were wrongabout when it is safe to deallocate.Finally, change the mem->size field to a size_t because that s the sametype that dma_alloc_coherent expects.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-26912 KY3.4-4A kernel Unaffected
CVE-2024-26912 KY3.4-5 kernel Unaffected
CVE-2024-26912 KY3.5.1 kernel Unaffected
CVE-2024-26912 KY3.5.3 kernel Unaffected
CVE-2024-26912 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-2053 下一篇:KylinSec-SA-2024-2055