In the Linux kernel, the following vulnerability has been resolved:
drm/xe: fix UAF around queue destruction
We currently do stuff like queuing the final destruction step on a
random system wq, which will outlive the driver instance. With bad
timing we can teardown the driver with one or more work workqueue still
being alive leading to various UAF splats. Add a fini step to ensure
user queues are properly torn down. At this point GuC should already be
nuked so queue itself should no longer be referenced from hw pov.
v2 (Matt B)
- Looks much safer to use a waitqueue and then just wait for the
xa_array to become empty before triggering the drain.
(cherry picked from commit 861108666cc0e999cffeab6aff17b662e68774e3)
References
Configurations
Configuration 1 (hide)
|
History
24 Oct 2024, 19:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/272b0e78874586d6ccae04079d75b27b47705544 - Patch | |
References | () https://git.kernel.org/stable/c/2d2be279f1ca9e7288282d4214f16eea8a727cdb - Patch | |
References | () https://git.kernel.org/stable/c/421c74670b0f9d5c007f1276d3647aa58f407fde - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* |
23 Oct 2024, 15:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Oct 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 18:15
Updated : 2024-10-24 19:57
NVD link : CVE-2024-49876
Mitre link : CVE-2024-49876
CVE.ORG link : CVE-2024-49876
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free