We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-49876

drm/xe: fix UAF around queue destruction



Description

In the Linux kernel, the following vulnerability has been resolved: drm/xe: fix UAF around queue destruction We currently do stuff like queuing the final destruction step on a random system wq, which will outlive the driver instance. With bad timing we can teardown the driver with one or more work workqueue still being alive leading to various UAF splats. Add a fini step to ensure user queues are properly torn down. At this point GuC should already be nuked so queue itself should no longer be referenced from hw pov. v2 (Matt B) - Looks much safer to use a waitqueue and then just wait for the xa_array to become empty before triggering the drain. (cherry picked from commit 861108666cc0e999cffeab6aff17b662e68774e3)

Reserved 2024-10-21 | Published 2024-10-21 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

dd08ebf6c352 before 272b0e788745
affected

dd08ebf6c352 before 421c74670b0f
affected

dd08ebf6c352 before 2d2be279f1ca
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/272b0e78874586d6ccae04079d75b27b47705544

git.kernel.org/...c/421c74670b0f9d5c007f1276d3647aa58f407fde

git.kernel.org/...c/2d2be279f1ca9e7288282d4214f16eea8a727cdb

cve.org (CVE-2024-49876)

nvd.nist.gov (CVE-2024-49876)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-49876

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.