We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56652

drm/xe/reg_sr: Remove register pool



Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe/reg_sr: Remove register pool That pool implementation doesn't really work: if the krealloc happens to move the memory and return another address, the entries in the xarray become invalid, leading to use-after-free later: BUG: KASAN: slab-use-after-free in xe_reg_sr_apply_mmio+0x570/0x760 [xe] Read of size 4 at addr ffff8881244b2590 by task modprobe/2753 Allocated by task 2753: kasan_save_stack+0x39/0x70 kasan_save_track+0x14/0x40 kasan_save_alloc_info+0x37/0x60 __kasan_kmalloc+0xc3/0xd0 __kmalloc_node_track_caller_noprof+0x200/0x6d0 krealloc_noprof+0x229/0x380 Simplify the code to fix the bug. A better pooling strategy may be added back later if needed. (cherry picked from commit e5283bd4dfecbd3335f43b62a68e24dae23f59e4)

Reserved 2024-12-27 | Published 2024-12-27 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

dd08ebf6c3525a7ea2186e636df064ea47281987 before b0193a31a0ca5a0f9e60bb4a86537d46b98111b8
affected

dd08ebf6c3525a7ea2186e636df064ea47281987 before d7b028656c29b22fcde1c6ee1df5b28fbba987b5
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.12.6
unaffected

6.13
unaffected

References

git.kernel.org/...c/b0193a31a0ca5a0f9e60bb4a86537d46b98111b8

git.kernel.org/...c/d7b028656c29b22fcde1c6ee1df5b28fbba987b5

cve.org (CVE-2024-56652)

nvd.nist.gov (CVE-2024-56652)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56652

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.