Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: drm/xe: fix UAF around queue destruction We currently do stuff like queuing the final destruction step on a random system wq, which will outlive the driver instance. With bad timing we can teardown the driver with one or more work workqueue still being alive leading to various UAF splats. Add a fini step to ensure user queues are properly torn down. At this point GuC should already be nuked so queue itself should no longer be referenced from hw pov. v2 (Matt B) - Looks much safer to use a waitqueue and then just wait for the xa_array to become empty before triggering the drain. (cherry picked from commit 861108666cc0e999cffeab6aff17b662e68774e3)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.8, < 6.10.14 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/272b0e78874586d6ccae04079d75b27b47705544Patch
- https://git.kernel.org/stable/c/2d2be279f1ca9e7288282d4214f16eea8a727cdbPatch
- https://git.kernel.org/stable/c/421c74670b0f9d5c007f1276d3647aa58f407fdePatch
FAQ
What is CVE-2024-49876?
CVE-2024-49876 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: drm/xe: fix UAF around queue destruction We currently do stuff like queuing the final destruction step on a random system wq, whic...
How severe is CVE-2024-49876?
CVE-2024-49876 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-49876?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.