First published: Fri Sep 27 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Restrict high priorities on group_create We were allowing any users to create a high priority group without any permission checks. As a result, this was allowing possible denial of service. We now only allow the DRM master or users with the CAP_SYS_NICE capability to set higher priorities than PANTHOR_GROUP_PRIORITY_MEDIUM. As the sole user of that uAPI lives in Mesa and hardcode a value of MEDIUM [1], this should be safe to do. Additionally, as those checks are performed at the ioctl level, panthor_group_create now only check for priority level validity. [1]https://gitlab.freedesktop.org/mesa/mesa/-/blob/f390835074bdf162a63deb0311d1a6de527f9f89/src/gallium/drivers/panfrost/pan_csf.c#L1038
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.10<6.10.10 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 | |
Linux Kernel | =6.11-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46837 has a severity rating that may allow for a denial of service attack.
To fix CVE-2024-46837, users should update their Linux kernel to a patched version beyond 6.10.10 or any 6.11 release candidate after rc6.
CVE-2024-46837 affects the Linux kernel versions from 6.10 up to 6.10.10 and specific 6.11 release candidates rc1 through rc6.
CVE-2024-46837 is a permission check vulnerability that allows unauthorized high priority group creation.
While CVE-2024-46837 primarily allows for denial of service, it does not directly cause data loss.