CWE
667
Advisory Published
Updated

CVE-2023-52486: drm: Don't unref the same fb many times by mistake due to deadlock handling

First published: Thu Feb 29 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: drm: Don't unref the same fb many times by mistake due to deadlock handling If we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl() we proceed to unref the fb and then retry the whole thing from the top. But we forget to reset the fb pointer back to NULL, and so if we then get another error during the retry, before the fb lookup, we proceed the unref the same fb again without having gotten another reference. The end result is that the fb will (eventually) end up being freed while it's still in use. Reset fb to NULL once we've unreffed it to avoid doing it again until we've done another fb lookup. This turned out to be pretty easy to hit on a DG2 when doing async flips (and CONFIG_DEBUG_WW_MUTEX_SLOWPATH=y). The first symptom I saw that drm_closefb() simply got stuck in a busy loop while walking the framebuffer list. Fortunately I was able to convince it to oops instead, and from there it was easier to track down the culprit.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
redhat/kernel<4.19.307
4.19.307
redhat/kernel<5.4.269
5.4.269
redhat/kernel<5.10.210
5.10.210
redhat/kernel<5.15.149
5.15.149
redhat/kernel<6.1.76
6.1.76
redhat/kernel<6.6.15
6.6.15
redhat/kernel<6.7.3
6.7.3
redhat/kernel<6.8
6.8
Linux Kernel<4.19.307
Linux Kernel>=4.20<5.4.269
Linux Kernel>=5.5<5.10.210
Linux Kernel>=5.11<5.15.149
Linux Kernel>=5.16<6.1.76
Linux Kernel>=6.2<6.6.15
Linux Kernel>=6.7<6.7.3
IBM Security Verify Governance - Identity Manager<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Software Stack<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Virtual Appliance<=ISVG 10.0.2
IBM Security Verify Governance Identity Manager Container<=ISVG 10.0.2
debian/linux
5.10.223-1
5.10.234-1
6.1.129-1
6.1.133-1
6.12.21-1
6.12.22-1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-52486?

    CVE-2023-52486 has been assigned a medium severity rating due to potential denial of service implications.

  • How do I fix CVE-2023-52486?

    To mitigate CVE-2023-52486, update the Linux kernel to version 4.19.307, 5.4.269, 5.10.210, 5.15.149, 6.1.76, 6.6.15, 6.7.3, or 6.8.

  • What versions of the Linux kernel are affected by CVE-2023-52486?

    CVE-2023-52486 affects Linux kernel versions prior to 4.19.307, between versions 4.20 and 5.4.269, 5.5 to 5.10.210, 5.11 to 5.15.149, 5.16 to 6.1.76, 6.2 to 6.6.15, and 6.7 to 6.7.3.

  • Is CVE-2023-52486 specific to any distribution?

    CVE-2023-52486 impacts multiple distributions of the Linux kernel, notably those provided by Red Hat and Debian.

  • What type of vulnerability is CVE-2023-52486?

    CVE-2023-52486 is a resource management issue that can lead to a denial of service due to improper reference counting in the Direct Rendering Manager.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203