Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-38592
HistoryJun 20, 2024 - 12:00 a.m.

CVE-2024-38592

2024-06-2000:00:00
ubuntu.com
ubuntu.com
linux kernel
drm/mediatek
vulnerability
ddp_comp array
crash
memory allocation

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: Init ddp_comp with devm_kcalloc()
In the case where conn_routes is true we allocate an extra slot in
the ddp_comp array but mtk_drm_crtc_create() never seemed to
initialize it in the test case I ran. For me, this caused a later
crash when we looped through the array in mtk_drm_crtc_mode_valid().
This showed up for me when I booted with slub_debug=FZPUA which
poisons the memory initially. Without slub_debug I couldn’t
reproduce, presumably because the later code handles the value being
NULL and in most cases (not guaranteed in all cases) the memory the
allocator returned started out as 0.
It really doesn’t hurt to initialize the array with devm_kcalloc()
since the array is small and the overhead of initting a handful of
elements to 0 is small. In general initting memory to zero is a safer
practice and usually it’s suggested to only use the non-initting alloc
functions if you really need to.
Let’s switch the function to use an allocation function that zeros the
memory. For me, this avoids the crash.

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%