Bug 1222365 (CVE-2024-26721) - VUL-0: CVE-2024-26721: kernel: drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address
Summary: VUL-0: CVE-2024-26721: kernel: drm/i915/dsc: Fix the macro that calculates DS...
Status: RESOLVED FIXED
Alias: CVE-2024-26721
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/400191/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26721:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-05 09:33 UTC by SMASH SMASH
Modified: 2024-06-25 18:24 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-04-05 09:33:10 UTC
In the Linux kernel, the following vulnerability has been resolved:

drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address

Commit bd077259d0a9 ("drm/i915/vdsc: Add function to read any PPS
register") defines a new macro to calculate the DSC PPS register
addresses with PPS number as an input. This macro correctly calculates
the addresses till PPS 11 since the addresses increment by 4. So in that
case the following macro works correctly to give correct register
address:

_MMIO(_DSCA_PPS_0 + (pps) * 4)

However after PPS 11, the register address for PPS 12 increments by 12
because of RC Buffer memory allocation in between. Because of this
discontinuity in the address space, the macro calculates wrong addresses
for PPS 12 - 16 resulting into incorrect DSC PPS parameter value
read/writes causing DSC corruption.

This fixes it by correcting this macro to add the offset of 12 for PPS
>=12.

v3: Add correct paranthesis for pps argument (Jani Nikula)

(cherry picked from commit 6074be620c31dc2ae11af96a1a5ea95580976fb5)

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26721
https://www.cve.org/CVERecord?id=CVE-2024-26721
https://git.kernel.org/stable/c/962ac2dce56bb3aad1f82a4bbe3ada57a020287c
https://git.kernel.org/stable/c/ff5999fb03f467e1e7159f0ddb199c787f7512b9
https://bugzilla.redhat.com/show_bug.cgi?id=2273139
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-26721.mbox