CVE-2024-35786

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35786
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35786.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35786
Downstream
Related
Published
2024-05-17T12:24:31.510Z
Modified
2025-11-20T04:00:26.689218Z
Summary
drm/nouveau: fix stale locked mutex in nouveau_gem_ioctl_pushbuf
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix stale locked mutex in nouveaugemioctl_pushbuf

If VMBIND is enabled on the client the legacy submission ioctl can't be used, however if a client tries to do so regardless it will return an error. In this case the clients mutex remained unlocked leading to a deadlock inside nouveaudrm_postclose or any other nouveau ioctl call.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b88baab828713ce0b49b185444b2ee83bed373a8
Fixed
c288a61a48ddb77ec097e11ab81b81027cd4e197
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b88baab828713ce0b49b185444b2ee83bed373a8
Fixed
b466416bdd6ecbde15ce987226ea633a0268fbb1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b88baab828713ce0b49b185444b2ee83bed373a8
Fixed
daf8739c3322a762ce84f240f50e0c39181a41ab

Affected versions

v6.*

v6.5
v6.5-rc3
v6.5-rc4
v6.5-rc5
v6.5-rc6
v6.5-rc7
v6.6
v6.6-rc1
v6.6-rc2
v6.6-rc3
v6.6-rc4
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.6.1
v6.6.10
v6.6.11
v6.6.12
v6.6.13
v6.6.14
v6.6.15
v6.6.16
v6.6.17
v6.6.18
v6.6.19
v6.6.2
v6.6.20
v6.6.21
v6.6.22
v6.6.23
v6.6.3
v6.6.4
v6.6.5
v6.6.6
v6.6.7
v6.6.8
v6.6.9
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.7.1
v6.7.10
v6.7.11
v6.7.2
v6.7.3
v6.7.4
v6.7.5
v6.7.6
v6.7.7
v6.7.8
v6.7.9
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "target": {
            "file": "drivers/gpu/drm/nouveau/nouveau_gem.c",
            "function": "nouveau_gem_ioctl_pushbuf"
        },
        "digest": {
            "length": 5719.0,
            "function_hash": "313005850308161169136201224640042943656"
        },
        "id": "CVE-2024-35786-0b4ee775",
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@daf8739c3322a762ce84f240f50e0c39181a41ab",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "224066720282776540468674335311623506188",
                "282705776888606735715700051243568225256",
                "279113573041322919864358930615650531531",
                "169745151104416620699102287527914981539"
            ]
        },
        "id": "CVE-2024-35786-493c2a9e",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b466416bdd6ecbde15ce987226ea633a0268fbb1",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "drivers/gpu/drm/nouveau/nouveau_gem.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "224066720282776540468674335311623506188",
                "282705776888606735715700051243568225256",
                "279113573041322919864358930615650531531",
                "169745151104416620699102287527914981539"
            ]
        },
        "id": "CVE-2024-35786-8b8aa9f8",
        "signature_type": "Line",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@daf8739c3322a762ce84f240f50e0c39181a41ab",
        "signature_version": "v1"
    },
    {
        "deprecated": false,
        "target": {
            "file": "drivers/gpu/drm/nouveau/nouveau_gem.c",
            "function": "nouveau_gem_ioctl_pushbuf"
        },
        "digest": {
            "length": 5719.0,
            "function_hash": "313005850308161169136201224640042943656"
        },
        "id": "CVE-2024-35786-dbf3f370",
        "signature_type": "Function",
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b466416bdd6ecbde15ce987226ea633a0268fbb1",
        "signature_version": "v1"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.6.0
Fixed
6.6.24
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.12