Bug 1795624 (CVE-2020-7053) - CVE-2020-7053 kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c
Summary: CVE-2020-7053 kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i...
Alias: CVE-2020-7053
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1795626 1814731 1814732 1814733 1814734 1814735
Blocks: 1795627
TreeView+ depends on / blocked
Reported: 2020-01-28 13:53 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-03-22 21:52 UTC (History)
46 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A use-after-free flaw was found in the Linux kernel’s GPU driver functionality when destroying GEM context. A local user could use this flaw to crash the system or potentially escalate their privileges.
Clone Of:
Last Closed: 2021-03-16 19:18:52 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:0856 0 None None None 2021-03-16 13:50:44 UTC
Red Hat Product Errata RHSA-2021:0857 0 None None None 2021-03-16 13:51:48 UTC

Description Guilherme de Almeida Suckevicz 2020-01-28 13:53:28 UTC
In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.


Upstream commit:

Comment 1 Guilherme de Almeida Suckevicz 2020-01-28 13:54:31 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1795626]

Comment 2 Justin M. Forbes 2020-01-28 17:11:32 UTC
This was fixed for Fedora with the 5.2.x kernel rebases.

Comment 9 Alex 2020-03-19 11:16:36 UTC

In case of dedicated graphic card presence and i915 GPU is not being used, you can prevent module i915 from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Comment 10 Alex 2020-03-19 11:27:56 UTC

The impact of this issue is Moderate, because attack is specific for certain Intel hardware and could be triggered only by local user with write access to the device.

Comment 14 errata-xmlrpc 2021-03-16 13:50:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:0856 https://access.redhat.com/errata/RHSA-2021:0856

Comment 15 errata-xmlrpc 2021-03-16 13:51:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2021:0857 https://access.redhat.com/errata/RHSA-2021:0857

Comment 16 Product Security DevOps Team 2021-03-16 19:18:52 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Note You need to log in before you can comment on or make changes to this bug.