CVE-2024-46837

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-46837
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46837.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46837
Downstream
Published
2024-09-27T13:15:15Z
Modified
2025-08-09T20:01:26Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Restrict high priorities on group_create

We were allowing any users to create a high priority group without any permission checks. As a result, this was allowing possible denial of service.

We now only allow the DRM master or users with the CAPSYSNICE capability to set higher priorities than PANTHORGROUPPRIORITY_MEDIUM.

As the sole user of that uAPI lives in Mesa and hardcode a value of MEDIUM [1], this should be safe to do.

Additionally, as those checks are performed at the ioctl level, panthorgroupcreate now only check for priority level validity.

[1]https://gitlab.freedesktop.org/mesa/mesa/-/blob/f390835074bdf162a63deb0311d1a6de527f9f89/src/gallium/drivers/panfrost/pan_csf.c#L1038

References

Affected packages

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.10.11-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}