In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Restrict untrusted app to attach to privileged PD Untrusted application with access to only non-secure fastrpc device node can attach to root_pd or static PDs if it can make the respective init request. This can cause problems as the untrusted application can send bad requests to root_pd or static PDs. Add changes to reject attach to privileged PDs if the request is being made using non-secure fastrpc device node.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2300938]
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024072919-CVE-2024-41024-be39@gregkh/T