cve-2024-43863
Vulnerability from cvelistv5
Published
2024-08-20 23:45
Modified
2024-12-19 09:17
Severity ?
EPSS score ?
0.06% (0.14004)
Summary
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a deadlock in dma buf fence polling Introduce a version of the fence ops that on release doesn't remove the fence from the pending list, and thus doesn't require a lock to fix poll->fence wait->fence unref deadlocks. vmwgfx overwrites the wait callback to iterate over the list of all fences and update their status, to do that it holds a lock to prevent the list modifcations from other threads. The fence destroy callback both deletes the fence and removes it from the list of pending fences, for which it holds a lock. dma buf polling cb unrefs a fence after it's been signaled: so the poll calls the wait, which signals the fences, which are being destroyed. The destruction tries to acquire the lock on the pending fences list which it can never get because it's held by the wait from which it was called. Old bug, but not a lot of userspace apps were using dma-buf polling interfaces. Fix those, in particular this fixes KDE stalls/deadlock.
Impacted products
Vendor Product Version
Linux Linux Version: 2298e804e96eb3635c39519c8287befd92460303
Version: 2298e804e96eb3635c39519c8287befd92460303
Version: 2298e804e96eb3635c39519c8287befd92460303
Version: 2298e804e96eb3635c39519c8287befd92460303
Version: 2298e804e96eb3635c39519c8287befd92460303
Create a notification for this product.
   Linux Linux Version: 3.18
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-43863",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-09-10T16:06:45.941347Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-09-12T17:33:19.603Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "drivers/gpu/drm/vmwgfx/vmwgfx_fence.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "9e20d028d8d1deb1e7fed18f22ffc01669cf3237",
                     status: "affected",
                     version: "2298e804e96eb3635c39519c8287befd92460303",
                     versionType: "git",
                  },
                  {
                     lessThan: "3b933b16c996af8adb6bc1b5748a63dfb41a82bc",
                     status: "affected",
                     version: "2298e804e96eb3635c39519c8287befd92460303",
                     versionType: "git",
                  },
                  {
                     lessThan: "a8943969f9ead2fd3044fc826140a21622ef830e",
                     status: "affected",
                     version: "2298e804e96eb3635c39519c8287befd92460303",
                     versionType: "git",
                  },
                  {
                     lessThan: "c98ab18b9f315ff977c2c65d7c71298ef98be8e3",
                     status: "affected",
                     version: "2298e804e96eb3635c39519c8287befd92460303",
                     versionType: "git",
                  },
                  {
                     lessThan: "e58337100721f3cc0c7424a18730e4f39844934f",
                     status: "affected",
                     version: "2298e804e96eb3635c39519c8287befd92460303",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "drivers/gpu/drm/vmwgfx/vmwgfx_fence.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "3.18",
                  },
                  {
                     lessThan: "3.18",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.165",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.104",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.45",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.10.*",
                     status: "unaffected",
                     version: "6.10.4",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.11",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a deadlock in dma buf fence polling\n\nIntroduce a version of the fence ops that on release doesn't remove\nthe fence from the pending list, and thus doesn't require a lock to\nfix poll->fence wait->fence unref deadlocks.\n\nvmwgfx overwrites the wait callback to iterate over the list of all\nfences and update their status, to do that it holds a lock to prevent\nthe list modifcations from other threads. The fence destroy callback\nboth deletes the fence and removes it from the list of pending\nfences, for which it holds a lock.\n\ndma buf polling cb unrefs a fence after it's been signaled: so the poll\ncalls the wait, which signals the fences, which are being destroyed.\nThe destruction tries to acquire the lock on the pending fences list\nwhich it can never get because it's held by the wait from which it\nwas called.\n\nOld bug, but not a lot of userspace apps were using dma-buf polling\ninterfaces. Fix those, in particular this fixes KDE stalls/deadlock.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-12-19T09:17:22.722Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/9e20d028d8d1deb1e7fed18f22ffc01669cf3237",
            },
            {
               url: "https://git.kernel.org/stable/c/3b933b16c996af8adb6bc1b5748a63dfb41a82bc",
            },
            {
               url: "https://git.kernel.org/stable/c/a8943969f9ead2fd3044fc826140a21622ef830e",
            },
            {
               url: "https://git.kernel.org/stable/c/c98ab18b9f315ff977c2c65d7c71298ef98be8e3",
            },
            {
               url: "https://git.kernel.org/stable/c/e58337100721f3cc0c7424a18730e4f39844934f",
            },
         ],
         title: "drm/vmwgfx: Fix a deadlock in dma buf fence polling",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-43863",
      datePublished: "2024-08-20T23:45:27.756Z",
      dateReserved: "2024-08-17T09:11:59.279Z",
      dateUpdated: "2024-12-19T09:17:22.722Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-43863\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-08-21T00:15:04.847\",\"lastModified\":\"2024-09-03T13:42:44.727\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/vmwgfx: Fix a deadlock in dma buf fence polling\\n\\nIntroduce a version of the fence ops that on release doesn't remove\\nthe fence from the pending list, and thus doesn't require a lock to\\nfix poll->fence wait->fence unref deadlocks.\\n\\nvmwgfx overwrites the wait callback to iterate over the list of all\\nfences and update their status, to do that it holds a lock to prevent\\nthe list modifcations from other threads. The fence destroy callback\\nboth deletes the fence and removes it from the list of pending\\nfences, for which it holds a lock.\\n\\ndma buf polling cb unrefs a fence after it's been signaled: so the poll\\ncalls the wait, which signals the fences, which are being destroyed.\\nThe destruction tries to acquire the lock on the pending fences list\\nwhich it can never get because it's held by the wait from which it\\nwas called.\\n\\nOld bug, but not a lot of userspace apps were using dma-buf polling\\ninterfaces. Fix those, in particular this fixes KDE stalls/deadlock.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: soluciona un punto muerto en el sondeo de valla de dma buf. Introduce una versión de las operaciones de valla que, al lanzarse, no elimina la valla de la lista de pendientes y, por tanto, no requiere un bloqueo para arreglar los puntos muertos de encuesta->espera de valla->cerca sin referencia. vmwgfx sobrescribe la devolución de llamada de espera para iterar sobre la lista de todas las barreras y actualizar su estado; para ello, mantiene un bloqueo para evitar que otros subprocesos modifiquen la lista. La devolución de llamada de destrucción de valla elimina la valla y la elimina de la lista de vallas pendientes, para las cuales mantiene un bloqueo. dma buf polling cb desrefs una valla después de haber sido señalada: entonces la encuesta llama a la espera, lo que señala las vallas que están siendo destruidas. La destrucción intenta adquirir el bloqueo en la lista de vallas pendientes que nunca puede conseguir porque está retenido por la espera desde la que fue llamado. Error antiguo, pero no muchas aplicaciones de espacio de usuario usaban interfaces de sondeo dma-buf. Solucionarlos, en particular esto soluciona los bloqueos/bloqueos de KDE.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.18\",\"versionEndExcluding\":\"5.15.165\",\"matchCriteriaId\":\"A02B7BA9-C2B0-475F-9401-338FBF89D50C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.104\",\"matchCriteriaId\":\"20DB9042-F89E-4024-B005-ACBBA99CA659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.45\",\"matchCriteriaId\":\"6ED8FBDF-48EE-4FEB-8B1A-CFF4FBCB27BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.10.4\",\"matchCriteriaId\":\"1F9FECDC-6CB8-41E5-B32A-E46776100D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B3CE743-2126-47A3-8B7C-822B502CF119\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3b933b16c996af8adb6bc1b5748a63dfb41a82bc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9e20d028d8d1deb1e7fed18f22ffc01669cf3237\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a8943969f9ead2fd3044fc826140a21622ef830e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c98ab18b9f315ff977c2c65d7c71298ef98be8e3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e58337100721f3cc0c7424a18730e4f39844934f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-43863\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:06:45.941347Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:22.790Z\"}}], \"cna\": {\"title\": \"drm/vmwgfx: Fix a deadlock in dma buf fence polling\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2298e804e96eb3635c39519c8287befd92460303\", \"lessThan\": \"9e20d028d8d1deb1e7fed18f22ffc01669cf3237\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2298e804e96eb3635c39519c8287befd92460303\", \"lessThan\": \"3b933b16c996af8adb6bc1b5748a63dfb41a82bc\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2298e804e96eb3635c39519c8287befd92460303\", \"lessThan\": \"a8943969f9ead2fd3044fc826140a21622ef830e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2298e804e96eb3635c39519c8287befd92460303\", \"lessThan\": \"c98ab18b9f315ff977c2c65d7c71298ef98be8e3\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2298e804e96eb3635c39519c8287befd92460303\", \"lessThan\": \"e58337100721f3cc0c7424a18730e4f39844934f\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/gpu/drm/vmwgfx/vmwgfx_fence.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.18\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"3.18\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.15.165\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.104\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.45\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.10.*\"}, {\"status\": \"unaffected\", \"version\": \"6.11\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/gpu/drm/vmwgfx/vmwgfx_fence.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/9e20d028d8d1deb1e7fed18f22ffc01669cf3237\"}, {\"url\": \"https://git.kernel.org/stable/c/3b933b16c996af8adb6bc1b5748a63dfb41a82bc\"}, {\"url\": \"https://git.kernel.org/stable/c/a8943969f9ead2fd3044fc826140a21622ef830e\"}, {\"url\": \"https://git.kernel.org/stable/c/c98ab18b9f315ff977c2c65d7c71298ef98be8e3\"}, {\"url\": \"https://git.kernel.org/stable/c/e58337100721f3cc0c7424a18730e4f39844934f\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/vmwgfx: Fix a deadlock in dma buf fence polling\\n\\nIntroduce a version of the fence ops that on release doesn't remove\\nthe fence from the pending list, and thus doesn't require a lock to\\nfix poll->fence wait->fence unref deadlocks.\\n\\nvmwgfx overwrites the wait callback to iterate over the list of all\\nfences and update their status, to do that it holds a lock to prevent\\nthe list modifcations from other threads. The fence destroy callback\\nboth deletes the fence and removes it from the list of pending\\nfences, for which it holds a lock.\\n\\ndma buf polling cb unrefs a fence after it's been signaled: so the poll\\ncalls the wait, which signals the fences, which are being destroyed.\\nThe destruction tries to acquire the lock on the pending fences list\\nwhich it can never get because it's held by the wait from which it\\nwas called.\\n\\nOld bug, but not a lot of userspace apps were using dma-buf polling\\ninterfaces. Fix those, in particular this fixes KDE stalls/deadlock.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2024-12-19T09:17:22.722Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-43863\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-19T09:17:22.722Z\", \"dateReserved\": \"2024-08-17T09:11:59.279Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-08-20T23:45:27.756Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.