• 公告ID (KylinSec-SA-2024-3433)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Check pat.ops before dumping PAT settings

We may leave pat.ops unset when running on brand new platform or
when running as a VF. While the former is unlikely, the latter
is valid (future) use case and will cause NPD when someone will
try to dump PAT settings by debugfs.

It's better to check pointer to pat.ops instead of specific .dump
hook, as we have this hook always defined for every .ops variant.

安全等级: Low

公告ID: KylinSec-SA-2024-3433

发布日期: 2024年8月28日

关联CVE: CVE-2024-42091  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Check pat.ops before dumping PAT settings

We may leave pat.ops unset when running on brand new platform or
when running as a VF. While the former is unlikely, the latter
is valid (future) use case and will cause NPD when someone will
try to dump PAT settings by debugfs.

It's better to check pointer to pat.ops instead of specific .dump
hook, as we have this hook always defined for every .ops variant.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-42091 KY3.4-5A kernel Unaffected
CVE-2024-42091 KY3.5.2 kernel Unaffected
CVE-2024-42091 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3432 下一篇:KylinSec-SA-2024-3434