First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/xe: fix UAF around queue destruction We currently do stuff like queuing the final destruction step on a random system wq, which will outlive the driver instance. With bad timing we can teardown the driver with one or more work workqueue still being alive leading to various UAF splats. Add a fini step to ensure user queues are properly torn down. At this point GuC should already be nuked so queue itself should no longer be referenced from hw pov. v2 (Matt B) - Looks much safer to use a waitqueue and then just wait for the xa_array to become empty before triggering the drain. (cherry picked from commit 861108666cc0e999cffeab6aff17b662e68774e3)
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.8<6.10.14 | |
Linux Kernel | >=6.11<6.11.3 | |
Linux Kernel | =6.12-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-49876 is classified as medium due to potential risks associated with use-after-free vulnerabilities in the Linux kernel.
To fix CVE-2024-49876, you should update your Linux kernel to a version later than 6.10.14, 6.11.3, or 6.12-rc1.
CVE-2024-49876 affects the Linux kernel versions from 6.8 to 6.10.14 and from 6.11 to 6.11.3, as well as version 6.12-rc1.
CVE-2024-49876 is a use-after-free vulnerability related to queue destruction in the Linux kernel.
Yes, CVE-2024-49876 could potentially be exploited in production environments if systems are running affected versions of the Linux kernel.