CVE-2024-43863

MEDIUM

Linux Kernel < 5.15.165 - Improper Locking

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a deadlock in dma buf fence polling Introduce a version of the fence ops that on release doesn't remove the fence from the pending list, and thus doesn't require a lock to fix poll->fence wait->fence unref deadlocks. vmwgfx overwrites the wait callback to iterate over the list of all fences and update their status, to do that it holds a lock to prevent the list modifcations from other threads. The fence destroy callback both deletes the fence and removes it from the list of pending fences, for which it holds a lock. dma buf polling cb unrefs a fence after it's been signaled: so the poll calls the wait, which signals the fences, which are being destroyed. The destruction tries to acquire the lock on the pending fences list which it can never get because it's held by the wait from which it was called. Old bug, but not a lot of userspace apps were using dma-buf polling interfaces. Fix those, in particular this fixes KDE stalls/deadlock.

Scores

CVSS v3 5.5
EPSS 0.0002
EPSS Percentile 4.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-667
Status published
Products (7)
linux/Kernel 3.18.0 - 5.10.238linux
linux/Kernel 5.11.0 - 5.15.165linux
linux/Kernel 5.16.0 - 6.1.104linux
linux/Kernel 6.2.0 - 6.6.45linux
linux/Kernel 6.7.0 - 6.10.4linux
linux/linux_kernel 6.11 rc1
linux/linux_kernel 3.18 - 5.15.165
Published Aug 21, 2024
Tracked Since Feb 18, 2026