CVE-2024-42091

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-42091
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42091.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-42091
Downstream
Published
2024-07-29T17:35:00Z
Modified
2025-10-15T12:46:31.224540Z
Summary
drm/xe: Check pat.ops before dumping PAT settings
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Check pat.ops before dumping PAT settings

We may leave pat.ops unset when running on brand new platform or when running as a VF. While the former is unlikely, the latter is valid (future) use case and will cause NPD when someone will try to dump PAT settings by debugfs.

It's better to check pointer to pat.ops instead of specific .dump hook, as we have this hook always defined for every .ops variant.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dd08ebf6c3525a7ea2186e636df064ea47281987
Fixed
583ce246c7ff9edeb0de49130cdc3d45db8545cb
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dd08ebf6c3525a7ea2186e636df064ea47281987
Fixed
a918e771e6fbe1fa68932af5b0cdf473e23090cc

Affected versions

v6.*

v6.7
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7
v6.9.1
v6.9.2
v6.9.3
v6.9.4
v6.9.5
v6.9.6
v6.9.7

Database specific

{
    "vanir_signatures": [
        {
            "digest": {
                "line_hashes": [
                    "6758978001529517151188726830859629913",
                    "1409090890359079437559255893935518329",
                    "286303557410619248782846693405932788618",
                    "288903603131567912188140709169565671584"
                ],
                "threshold": 0.9
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a918e771e6fbe1fa68932af5b0cdf473e23090cc",
            "signature_type": "Line",
            "target": {
                "file": "drivers/gpu/drm/xe/xe_pat.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-42091-142c6bbe"
        },
        {
            "digest": {
                "length": 175.0,
                "function_hash": "113777302283115438356060897425297316347"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@583ce246c7ff9edeb0de49130cdc3d45db8545cb",
            "signature_type": "Function",
            "target": {
                "function": "xe_pat_dump",
                "file": "drivers/gpu/drm/xe/xe_pat.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-42091-85ba63b3"
        },
        {
            "digest": {
                "line_hashes": [
                    "6758978001529517151188726830859629913",
                    "1409090890359079437559255893935518329",
                    "286303557410619248782846693405932788618",
                    "288903603131567912188140709169565671584"
                ],
                "threshold": 0.9
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@583ce246c7ff9edeb0de49130cdc3d45db8545cb",
            "signature_type": "Line",
            "target": {
                "file": "drivers/gpu/drm/xe/xe_pat.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-42091-8ad251be"
        },
        {
            "digest": {
                "length": 175.0,
                "function_hash": "113777302283115438356060897425297316347"
            },
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a918e771e6fbe1fa68932af5b0cdf473e23090cc",
            "signature_type": "Function",
            "target": {
                "function": "xe_pat_dump",
                "file": "drivers/gpu/drm/xe/xe_pat.c"
            },
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-42091-c36e8fdb"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.9.8