跳转到帖子

Debian: CVE-2024-56551: linux -- security update

recommended_posts

发布于
  • Members

Debian: CVE-2024-56551: linux -- security update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
12/27/2024
Created
02/11/2025
Added
02/10/2025
Modified
02/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix usage slab after free [+0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [+0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147 [+0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1 [+0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020 [+0.000016] Call Trace: [+0.000008]<TASK> [+0.000009]dump_stack_lvl+0x76/0xa0 [+0.000017]print_report+0xce/0x5f0 [+0.000017]? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [+0.000019]? srso_return_thunk+0x5/0x5f [+0.000015]? kasan_complete_mode_report_info+0x72/0x200 [+0.000016]? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [+0.000019]kasan_report+0xbe/0x110 [+0.000015]? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [+0.000023]__asan_report_load8_noabort+0x14/0x30 [+0.000014]drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched] [+0.000020]? srso_return_thunk+0x5/0x5f [+0.000013]? __kasan_check_write+0x14/0x30 [+0.000016]? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched] [+0.000020]? srso_return_thunk+0x5/0x5f [+0.000013]? __kasan_check_write+0x14/0x30 [+0.000013]? srso_return_thunk+0x5/0x5f [+0.000013]? enable_work+0x124/0x220 [+0.000015]? __pfx_enable_work+0x10/0x10 [+0.000013]? srso_return_thunk+0x5/0x5f [+0.000014]? free_large_kmalloc+0x85/0xf0 [+0.000016]drm_sched_entity_destroy+0x18/0x30 [gpu_sched] [+0.000020]amdgpu_vce_sw_fini+0x55/0x170 [amdgpu] [+0.000735]? __kasan_check_read+0x11/0x20 [+0.000016]vce_v4_0_sw_fini+0x80/0x110 [amdgpu] [+0.000726]amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu] [+0.000679]? mutex_unlock+0x80/0xe0 [+0.000017]? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu] [+0.000662]? srso_return_thunk+0x5/0x5f [+0.000014]? __kasan_check_write+0x14/0x30 [+0.000013]? srso_return_thunk+0x5/0x5f [+0.000013]? mutex_unlock+0x80/0xe0 [+0.000016]amdgpu_driver_release_kms+0x16/0x80 [amdgpu] [+0.000663]drm_minor_release+0xc9/0x140 [drm] [+0.000081]drm_release+0x1fd/0x390 [drm] [+0.000082]__fput+0x36c/0xad0 [+0.000018]__fput_sync+0x3c/0x50 [+0.000014]__x64_sys_close+0x7d/0xe0 [+0.000014]x64_sys_call+0x1bc6/0x2680 [+0.000014]do_syscall_64+0x70/0x130 [+0.000014]? srso_return_thunk+0x5/0x5f [+0.000014]? irqentry_exit_to_user_mode+0x60/0x190 [+0.000015]? srso_return_thunk+0x5/0x5f [+0.000014]? irqentry_exit+0x43/0x50 [+0.000012]? srso_return_thunk+0x5/0x5f [+0.000013]? exc_page_fault+0x7c/0x110 [+0.000015]entry_SYSCALL_64_after_hwframe+0x76/0x7e [+0.000014] RIP: 0033:0x7ffff7b14f67 [+0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff [+0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [+0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67 [+0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003 [+0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000 [+0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8 [+0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040 [+0.000020]</TASK> [+0.000016] Allocated by task 383 on cpu 7 at 26.880319s: [+0.000014]kasan_save_stack+0x28/0x60 [+0.000008]kasan_save_track+0x18/0x70 [+0.000007]kasan_save_alloc_info+0x38/0x60 [+0.000007]__kasan_kmalloc+0xc1/0xd0 [+0.000007]kmalloc_trace_noprof+0x180/0x380 [+0.000007]drm_sched_init+0x411/0xec0 [gpu_sched] [+0.000012]amdgpu_device_init+0x695f/0xa610 [amdgpu] [+0.000658]amdgpu_driver_load_kms+0x1a/0x120 [amdgpu] [+0.000662]amdgpu_pci_p ---truncated---

Solution(s)

  • debian-upgrade-linux

References

  • https://attackerkb.com/topics/cve-2024-56551
  • CVE - 2024-56551
  • DSA-5860-1
  • 查看数 699
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…