In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip
It’s possible that mtk_crtc->event is NULL in
mtk_drm_crtc_finish_page_flip(). pending_needs_vblank value is set by
mtk_crtc->event, but in mtk_drm_crtc_atomic_flush(), it’s is not guarded by
the same lock in mtk_drm_finish_page_flip(), thus a race condition happens.
Consider the following case: CPU1 CPU2 step 1: mtk_drm_crtc_atomic_begin()
mtk_crtc->event is not null, step 1: mtk_drm_crtc_atomic_flush:
mtk_drm_crtc_update_config( !!mtk_crtc->event) step 2: mtk_crtc_ddp_irq ->
mtk_drm_finish_page_flip: lock mtk_crtc->event set to null,
pending_needs_vblank set to false unlock pending_needs_vblank set to true,
step 2: mtk_crtc_ddp_irq -> mtk_drm_finish_page_flip called again,
pending_needs_vblank is still true //null pointer Instead of guarding the
entire mtk_drm_crtc_atomic_flush(), it’s more efficient to just check if
mtk_crtc->event is null before use.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < 6.8.0-1009.9 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
git.kernel.org/linus/c958e86e9cc1b48cac004a6e245154dfba8e163b (6.9-rc1)
git.kernel.org/stable/c/3fc88b246a2fc16014e374040fc15af1d3752535
git.kernel.org/stable/c/4688be96d20ffa49d2186523ee84f475f316fd49
git.kernel.org/stable/c/9acee29a38b4d4b70f1f583e5ef9a245db4db710
git.kernel.org/stable/c/9beec711a17245b853d64488fd5b739031612340
git.kernel.org/stable/c/a3dd12b64ae8373a41a216a0b621df224210860a
git.kernel.org/stable/c/accdac6b71d5a2b84040c3d2234f53a60edc398e
git.kernel.org/stable/c/c958e86e9cc1b48cac004a6e245154dfba8e163b
git.kernel.org/stable/c/d2bd30c710475b2e29288827d2c91f9e6e2b91d7
git.kernel.org/stable/c/dfde84cc6c589f2a9f820f12426d97365670b731
launchpad.net/bugs/cve/CVE-2024-26874
nvd.nist.gov/vuln/detail/CVE-2024-26874
security-tracker.debian.org/tracker/CVE-2024-26874
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
www.cve.org/CVERecord?id=CVE-2024-26874