ghsa-mpm4-ggh2-c745
Vulnerability from github
Published
2024-09-13 06:30
Modified
2024-09-13 18:31
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Disable preemption while updating GPU stats

We forgot to disable preemption around the write_seqcount_begin/end() pair while updating GPU stats:

[ ] WARNING: CPU: 2 PID: 12 at include/linux/seqlock.h:221 __seqprop_assert.isra.0+0x128/0x150 [v3d] [ ] Workqueue: v3d_bin drm_sched_run_job_work [gpu_sched] <...snip...> [ ] Call trace: [ ] __seqprop_assert.isra.0+0x128/0x150 [v3d] [ ] v3d_job_start_stats.isra.0+0x90/0x218 [v3d] [ ] v3d_bin_job_run+0x23c/0x388 [v3d] [ ] drm_sched_run_job_work+0x520/0x6d0 [gpu_sched] [ ] process_one_work+0x62c/0xb48 [ ] worker_thread+0x468/0x5b0 [ ] kthread+0x1c4/0x1e0 [ ] ret_from_fork+0x10/0x20

Fix it.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2024-46699"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-09-13T06:15:14Z",
    "severity": "HIGH"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/v3d: Disable preemption while updating GPU stats\n\nWe forgot to disable preemption around the write_seqcount_begin/end() pair\nwhile updating GPU stats:\n\n  [ ] WARNING: CPU: 2 PID: 12 at include/linux/seqlock.h:221 __seqprop_assert.isra.0+0x128/0x150 [v3d]\n  [ ] Workqueue: v3d_bin drm_sched_run_job_work [gpu_sched]\n \u003c...snip...\u003e\n  [ ] Call trace:\n  [ ]  __seqprop_assert.isra.0+0x128/0x150 [v3d]\n  [ ]  v3d_job_start_stats.isra.0+0x90/0x218 [v3d]\n  [ ]  v3d_bin_job_run+0x23c/0x388 [v3d]\n  [ ]  drm_sched_run_job_work+0x520/0x6d0 [gpu_sched]\n  [ ]  process_one_work+0x62c/0xb48\n  [ ]  worker_thread+0x468/0x5b0\n  [ ]  kthread+0x1c4/0x1e0\n  [ ]  ret_from_fork+0x10/0x20\n\nFix it.",
  "id": "GHSA-mpm4-ggh2-c745",
  "modified": "2024-09-13T18:31:46Z",
  "published": "2024-09-13T06:30:43Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-46699"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/1e93467ef20308da5a94cde548ee17d523e8ba7b"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/9d824c7fce58f59982228aa85b0376b113cdfa35"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.