Bug 1760490 (CVE-2019-16229)

Summary: CVE-2019-16229 kernel: null pointer dereference in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: acaringi, airlied, bdettelb, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, lgoncalv, linville, masami256, mchehab, mcressma, mjg59, mlangsdo, nmurray, rkeshri, rt-maint, rvrbovsk, steved, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference flaw was found in kfd_interrupt_init in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in AMD GPU driver. Here a call to alloc_workqueue return was not validated and can cause a denial of service at the time of failure. This could allow an attacker to crash the system or leak kernel internal information.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-25 09:55:51 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1760492, 1811613, 1811614, 1811615, 1811616, 1811617    
Bug Blocks: 1760493    

Description Guilherme de Almeida Suckevicz 2019-10-10 16:37:51 UTC
A NULL pointer dereference flaw was found in kfd_interrupt_init in drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in AMD GPU driver.  Here a call to alloc_workqueue return was not validated and can cause a denial of service at the time of failure. This could allow an attacker to crash the system or leak kernel internal information.

Reference:
https://lkml.org/lkml/2019/9/9/487

Comment 1 Guilherme de Almeida Suckevicz 2019-10-10 16:42:01 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1760492]

Comment 4 Rohit Keshri 2020-03-09 11:10:04 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Comment 6 Justin M. Forbes 2020-03-19 21:52:54 UTC
This is fixed in Fedora with the 5.4.7 stable kernel updates.