cve-2024-43863
Vulnerability from cvelistv5
Published
2024-08-20 23:45
Modified
2024-11-05 09:41
Severity ?
Summary
drm/vmwgfx: Fix a deadlock in dma buf fence polling
Impacted products
Vendor Product Version
Linux Linux Version: 3.18
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-43863",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:06:45.941347Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-12T17:33:19.603Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/vmwgfx/vmwgfx_fence.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "9e20d028d8d1",
              "status": "affected",
              "version": "2298e804e96e",
              "versionType": "git"
            },
            {
              "lessThan": "3b933b16c996",
              "status": "affected",
              "version": "2298e804e96e",
              "versionType": "git"
            },
            {
              "lessThan": "a8943969f9ea",
              "status": "affected",
              "version": "2298e804e96e",
              "versionType": "git"
            },
            {
              "lessThan": "c98ab18b9f31",
              "status": "affected",
              "version": "2298e804e96e",
              "versionType": "git"
            },
            {
              "lessThan": "e58337100721",
              "status": "affected",
              "version": "2298e804e96e",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/vmwgfx/vmwgfx_fence.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.18"
            },
            {
              "lessThan": "3.18",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.165",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.104",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.45",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.10.*",
              "status": "unaffected",
              "version": "6.10.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.11",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a deadlock in dma buf fence polling\n\nIntroduce a version of the fence ops that on release doesn\u0027t remove\nthe fence from the pending list, and thus doesn\u0027t require a lock to\nfix poll-\u003efence wait-\u003efence unref deadlocks.\n\nvmwgfx overwrites the wait callback to iterate over the list of all\nfences and update their status, to do that it holds a lock to prevent\nthe list modifcations from other threads. The fence destroy callback\nboth deletes the fence and removes it from the list of pending\nfences, for which it holds a lock.\n\ndma buf polling cb unrefs a fence after it\u0027s been signaled: so the poll\ncalls the wait, which signals the fences, which are being destroyed.\nThe destruction tries to acquire the lock on the pending fences list\nwhich it can never get because it\u0027s held by the wait from which it\nwas called.\n\nOld bug, but not a lot of userspace apps were using dma-buf polling\ninterfaces. Fix those, in particular this fixes KDE stalls/deadlock."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-05T09:41:21.731Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/9e20d028d8d1deb1e7fed18f22ffc01669cf3237"
        },
        {
          "url": "https://git.kernel.org/stable/c/3b933b16c996af8adb6bc1b5748a63dfb41a82bc"
        },
        {
          "url": "https://git.kernel.org/stable/c/a8943969f9ead2fd3044fc826140a21622ef830e"
        },
        {
          "url": "https://git.kernel.org/stable/c/c98ab18b9f315ff977c2c65d7c71298ef98be8e3"
        },
        {
          "url": "https://git.kernel.org/stable/c/e58337100721f3cc0c7424a18730e4f39844934f"
        }
      ],
      "title": "drm/vmwgfx: Fix a deadlock in dma buf fence polling",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-43863",
    "datePublished": "2024-08-20T23:45:27.756Z",
    "dateReserved": "2024-08-17T09:11:59.279Z",
    "dateUpdated": "2024-11-05T09:41:21.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-43863\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-21T00:15:04.847\",\"lastModified\":\"2024-09-03T13:42:44.727\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/vmwgfx: Fix a deadlock in dma buf fence polling\\n\\nIntroduce a version of the fence ops that on release doesn\u0027t remove\\nthe fence from the pending list, and thus doesn\u0027t require a lock to\\nfix poll-\u003efence wait-\u003efence unref deadlocks.\\n\\nvmwgfx overwrites the wait callback to iterate over the list of all\\nfences and update their status, to do that it holds a lock to prevent\\nthe list modifcations from other threads. The fence destroy callback\\nboth deletes the fence and removes it from the list of pending\\nfences, for which it holds a lock.\\n\\ndma buf polling cb unrefs a fence after it\u0027s been signaled: so the poll\\ncalls the wait, which signals the fences, which are being destroyed.\\nThe destruction tries to acquire the lock on the pending fences list\\nwhich it can never get because it\u0027s held by the wait from which it\\nwas called.\\n\\nOld bug, but not a lot of userspace apps were using dma-buf polling\\ninterfaces. Fix those, in particular this fixes KDE stalls/deadlock.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: soluciona un punto muerto en el sondeo de valla de dma buf. Introduce una versi\u00f3n de las operaciones de valla que, al lanzarse, no elimina la valla de la lista de pendientes y, por tanto, no requiere un bloqueo para arreglar los puntos muertos de encuesta-\u0026gt;espera de valla-\u0026gt;cerca sin referencia. vmwgfx sobrescribe la devoluci\u00f3n de llamada de espera para iterar sobre la lista de todas las barreras y actualizar su estado; para ello, mantiene un bloqueo para evitar que otros subprocesos modifiquen la lista. La devoluci\u00f3n de llamada de destrucci\u00f3n de valla elimina la valla y la elimina de la lista de vallas pendientes, para las cuales mantiene un bloqueo. dma buf polling cb desrefs una valla despu\u00e9s de haber sido se\u00f1alada: entonces la encuesta llama a la espera, lo que se\u00f1ala las vallas que est\u00e1n siendo destruidas. La destrucci\u00f3n intenta adquirir el bloqueo en la lista de vallas pendientes que nunca puede conseguir porque est\u00e1 retenido por la espera desde la que fue llamado. Error antiguo, pero no muchas aplicaciones de espacio de usuario usaban interfaces de sondeo dma-buf. Solucionarlos, en particular esto soluciona los bloqueos/bloqueos de KDE.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.18\",\"versionEndExcluding\":\"5.15.165\",\"matchCriteriaId\":\"A02B7BA9-C2B0-475F-9401-338FBF89D50C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.104\",\"matchCriteriaId\":\"20DB9042-F89E-4024-B005-ACBBA99CA659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.45\",\"matchCriteriaId\":\"6ED8FBDF-48EE-4FEB-8B1A-CFF4FBCB27BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.4\",\"matchCriteriaId\":\"1F9FECDC-6CB8-41E5-B32A-E46776100D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3b933b16c996af8adb6bc1b5748a63dfb41a82bc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9e20d028d8d1deb1e7fed18f22ffc01669cf3237\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a8943969f9ead2fd3044fc826140a21622ef830e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c98ab18b9f315ff977c2c65d7c71298ef98be8e3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e58337100721f3cc0c7424a18730e4f39844934f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.