In the Linux kernel, the following vulnerability has been resolved:
drm/xe/ufence: Prefetch ufence addr to catch bogus address
access_ok() only checks for addr overflow so also try to read the addr to catch invalid addr sent from userspace.
(cherry picked from commit 9408c4508483ffc60811e910a93d6425b8e63928)
[
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c1813b3253480b30604c680026c7dc721ce86d1",
"deprecated": false,
"id": "CVE-2024-53098-1be95d3b",
"signature_type": "Function",
"digest": {
"function_hash": "330822138396856597137031537693242117558",
"length": 459.0
},
"target": {
"function": "user_fence_create",
"file": "drivers/gpu/drm/xe/xe_sync.c"
}
},
{
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9c1813b3253480b30604c680026c7dc721ce86d1",
"deprecated": false,
"id": "CVE-2024-53098-b3fa7713",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"306512168930597221599542370710383293269",
"20452213982111056549273591458566407761",
"302578726376060497353361596269161314789",
"99613774914549781507307469816985917670",
"157843895702302773897460089007477995682"
]
},
"target": {
"file": "drivers/gpu/drm/xe/xe_sync.c"
}
}
]