CVE-2024-35786

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35786
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35786.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35786
Downstream
Related
Published
2024-05-17T12:24:31Z
Modified
2025-10-15T10:11:30.521750Z
Summary
drm/nouveau: fix stale locked mutex in nouveau_gem_ioctl_pushbuf
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix stale locked mutex in nouveaugemioctl_pushbuf

If VMBIND is enabled on the client the legacy submission ioctl can't be used, however if a client tries to do so regardless it will return an error. In this case the clients mutex remained unlocked leading to a deadlock inside nouveaudrm_postclose or any other nouveau ioctl call.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b88baab828713ce0b49b185444b2ee83bed373a8
Fixed
c288a61a48ddb77ec097e11ab81b81027cd4e197
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b88baab828713ce0b49b185444b2ee83bed373a8
Fixed
b466416bdd6ecbde15ce987226ea633a0268fbb1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b88baab828713ce0b49b185444b2ee83bed373a8
Fixed
daf8739c3322a762ce84f240f50e0c39181a41ab

Affected versions

v6.*

v6.5
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.3
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.1
v6.7.10
v6.7.11
v6.7.2
v6.7.3
v6.7.4
v6.7.5
v6.7.6
v6.7.7
v6.7.8
v6.7.9
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5

Database specific

{
    "vanir_signatures": [
        {
            "digest": {
                "length": 5719.0,
                "function_hash": "313005850308161169136201224640042943656"
            },
            "target": {
                "function": "nouveau_gem_ioctl_pushbuf",
                "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@daf8739c3322a762ce84f240f50e0c39181a41ab",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-35786-0b4ee775"
        },
        {
            "digest": {
                "length": 5719.0,
                "function_hash": "313005850308161169136201224640042943656"
            },
            "target": {
                "function": "nouveau_gem_ioctl_pushbuf",
                "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c288a61a48ddb77ec097e11ab81b81027cd4e197",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-35786-10635bc7"
        },
        {
            "digest": {
                "line_hashes": [
                    "224066720282776540468674335311623506188",
                    "282705776888606735715700051243568225256",
                    "279113573041322919864358930615650531531",
                    "169745151104416620699102287527914981539"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b466416bdd6ecbde15ce987226ea633a0268fbb1",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-35786-493c2a9e"
        },
        {
            "digest": {
                "line_hashes": [
                    "224066720282776540468674335311623506188",
                    "282705776888606735715700051243568225256",
                    "279113573041322919864358930615650531531",
                    "169745151104416620699102287527914981539"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c288a61a48ddb77ec097e11ab81b81027cd4e197",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-35786-53b0fa65"
        },
        {
            "digest": {
                "line_hashes": [
                    "224066720282776540468674335311623506188",
                    "282705776888606735715700051243568225256",
                    "279113573041322919864358930615650531531",
                    "169745151104416620699102287527914981539"
                ],
                "threshold": 0.9
            },
            "target": {
                "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
            },
            "signature_type": "Line",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@daf8739c3322a762ce84f240f50e0c39181a41ab",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-35786-8b8aa9f8"
        },
        {
            "digest": {
                "length": 5719.0,
                "function_hash": "313005850308161169136201224640042943656"
            },
            "target": {
                "function": "nouveau_gem_ioctl_pushbuf",
                "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
            },
            "signature_type": "Function",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b466416bdd6ecbde15ce987226ea633a0268fbb1",
            "deprecated": false,
            "signature_version": "v1",
            "id": "CVE-2024-35786-dbf3f370"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.24
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.12