First published: Fri Nov 08 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/vc4: Stop the active perfmon before being destroyed Upon closing the file descriptor, the active performance monitor is not stopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`, the active performance monitor's pointer (`vc4->active_perfmon`) is still retained. If we open a new file descriptor and submit a few jobs with performance monitors, the driver will attempt to stop the active performance monitor using the stale pointer in `vc4->active_perfmon`. However, this pointer is no longer valid because the previous process has already terminated, and all performance monitors associated with it have been destroyed and freed. To fix this, when the active performance monitor belongs to a given process, explicitly stop it before destroying and freeing it.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.17<6.1.113 | |
Linux Kernel | >=6.2<6.6.57 | |
Linux Kernel | >=6.7<6.11.4 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
debian/linux-6.1 | 6.1.119-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50187 is classified as a vulnerability in the Linux kernel that may impact system performance and stability.
To address CVE-2024-50187, update to the latest stable version of the Linux kernel which includes the relevant fixes.
CVE-2024-50187 affects Linux kernel versions between 4.17 and 6.1.113, and versions from 6.2 to 6.6.57, as well as the 6.12-rc1 and 6.12-rc2 releases.
The primary issue in CVE-2024-50187 is that the active performance monitor is not stopped when the file descriptor is closed, potentially leading to resource leaks.
There are no specific workarounds for CVE-2024-50187; the best course of action is to apply the kernel updates that mitigate this vulnerability.