Bug 1876995 (CVE-2020-25639) - CVE-2020-25639 kernel: NULL pointer dereference via nouveau ioctl can lead to DoS
Summary: CVE-2020-25639 kernel: NULL pointer dereference via nouveau ioctl can lead to...
Keywords:
Status: NEW
Alias: CVE-2020-25639
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1911194 1935209 1877471 1877472 1881465
Blocks: 1873622
TreeView+ depends on / blocked
 
Reported: 2020-09-08 16:51 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-03-04 14:25 UTC (History)
47 users (show)

Fixed In Version: Linux kernel 5.12-rc1
Doc Type: If docs needed, set a value
Doc Text:
A NULL pointer dereference flaw was found in the Linux kernel’s GPU Nouveau driver functionality in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-09-08 16:51:13 UTC
A flaw was found in the Linux kernel where an unprivileged console user can crash kernel via a nouveau ioctl.

Reference:
https://lists.freedesktop.org/archives/nouveau/2020-August/036682.html

Comment 4 Alex 2020-09-21 20:07:32 UTC
Acknowledgments:

Name: Frantisek Hrbata (Red Hat)

Comment 6 Alex 2020-09-22 13:10:08 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1881465]

Comment 7 RaTasha Tillery-Smith 2020-09-29 19:41:49 UTC
Statement:

This flaw is rated as having a Low impact because the issue can only be triggered by an authorized local user in the render group.

Comment 10 Alex 2020-12-09 16:34:48 UTC
Mitigation:

To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.


Note You need to log in before you can comment on or make changes to this bug.