First published: Sat Aug 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/v3d: Validate passed in drm syncobj handles in the timestamp extension If userspace provides an unknown or invalid handle anywhere in the handle array the rest of the driver will not handle that well. Fix it by checking handle was looked up successfully or otherwise fail the extension by jumping into the existing unwind. (cherry picked from commit 8d1276d1b8f738c3afe1457d4dff5cc66fc848a3)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42261 has been classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2024-42261, update to a patched version of the Linux kernel such as 5.10.223-1 or later.
CVE-2024-42261 affects Linux kernel versions prior to 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.10-1, and 6.12.11-1.
CVE-2024-42261 impacts the drm/v3d subsystem in the Linux kernel, specifically related to drm syncobj handles.
CVE-2024-42261 can be exploited by userspace providing an invalid handle, indicating that user confirmation is not necessary for exploitation.