First published: Fri May 17 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix stale locked mutex in nouveau_gem_ioctl_pushbuf If VM_BIND is enabled on the client the legacy submission ioctl can't be used, however if a client tries to do so regardless it will return an error. In this case the clients mutex remained unlocked leading to a deadlock inside nouveau_drm_postclose or any other nouveau ioctl call.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=6.6<6.6.24 | |
Linux kernel | >=6.7<6.7.12 | |
Linux kernel | =6.8-rc1 | |
Linux kernel | =6.8-rc2 | |
Linux kernel | =6.8-rc3 | |
Linux kernel | =6.8-rc4 | |
Linux kernel | =6.8-rc5 | |
Linux kernel | =6.8-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-35786 is currently classified as moderate.
To fix CVE-2024-35786, update the Linux kernel to versions above 6.8-rc6 or apply any available patches.
CVE-2024-35786 affects Linux kernel versions from 6.6 to 6.8-rc6.
CVE-2024-35786 involves the DRM subsystem, specifically the nouveau driver and its handling of mutex locks.
There is no current indication that CVE-2024-35786 is being actively exploited in the wild.