Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2024-43863 | First vendor Publication | 2024-08-21 |
Vendor | Cve | Last vendor Modification | 2024-09-03 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | |||
---|---|---|---|
Overall CVSS Score | 5.5 | ||
Base Score | 5.5 | Environmental Score | 5.5 |
impact SubScore | 3.6 | Temporal Score | 5.5 |
Exploitabality Sub Score | 1.8 | ||
Attack Vector | Local | Attack Complexity | Low |
Privileges Required | Low | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | None |
Integrity Impact | None | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | N/A | Attack Range | N/A |
Cvss Impact Score | N/A | Attack Complexity | N/A |
Cvss Expoit Score | N/A | Authentication | N/A |
Calculate full CVSS 2.0 Vectors scores |
Detail
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a deadlock in dma buf fence polling Introduce a version of the fence ops that on release doesn't remove the fence from the pending list, and thus doesn't require a lock to fix poll->fence wait->fence unref deadlocks. vmwgfx overwrites the wait callback to iterate over the list of all fences and update their status, to do that it holds a lock to prevent the list modifcations from other threads. The fence destroy callback both deletes the fence and removes it from the list of pending fences, for which it holds a lock. dma buf polling cb unrefs a fence after it's been signaled: so the poll calls the wait, which signals the fences, which are being destroyed. The destruction tries to acquire the lock on the pending fences list which it can never get because it's held by the wait from which it was called. Old bug, but not a lot of userspace apps were using dma-buf polling interfaces. Fix those, in particular this fixes KDE stalls/deadlock. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-667 | Insufficient Locking |
CPE : Common Platform Enumeration
Sources (Detail)
Alert History
Date | Informations |
---|---|
2025-01-08 03:04:36 |
|
2025-01-07 03:04:09 |
|
2024-12-25 03:02:47 |
|
2024-12-12 03:05:43 |
|
2024-11-23 03:02:45 |
|
2024-11-22 03:00:56 |
|
2024-11-20 02:59:16 |
|
2024-11-14 02:59:35 |
|
2024-11-09 02:59:35 |
|
2024-10-26 02:56:58 |
|
2024-10-25 02:58:51 |
|
2024-10-23 02:58:03 |
|
2024-10-03 02:53:19 |
|
2024-10-02 02:51:43 |
|
2024-09-15 02:49:23 |
|
2024-09-11 21:27:50 |
|
2024-09-06 21:28:11 |
|
2024-09-06 00:27:52 |
|
2024-09-03 21:27:45 |
|
2024-09-03 17:27:40 |
|
2024-08-22 02:48:16 |
|
2024-08-22 02:48:01 |
|
2024-08-21 17:27:26 |
|
2024-08-21 09:27:29 |
|