|
Message-ID: <20200819165722.GD3698439@kroah.com> Date: Wed, 19 Aug 2020 18:57:22 +0200 From: Greg KH <greg@...ah.com> To: oss-security@...ts.openwall.com Subject: Re: Linux Kernel 5.7.9 DRM Double Free On Wed, Aug 19, 2020 at 05:55:16PM +0200, Greg KH wrote: > On Wed, Aug 19, 2020 at 03:42:33PM +0000, zdi-disclosures@...ndmicro.com wrote: > > The specific flaw exists within DRM memory management. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. > > Note, this "vulnerability" was only accessible by root, so there's not > all that many privileges that could really be escalated there. Don't > know why the original poster did not say that here, as they acknowledged > it in the "bug report" they sent many of us. And to be specific, as I was asked, this was only an issue in the nouveau drm driver, not in the DRM "core" at all. So only that one driver was affected. thanks, greg k-h
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.