CVE-2024-53086

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53086
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53086.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-53086
Downstream
Related
Published
2024-11-19T17:45:14Z
Modified
2025-10-22T05:19:20.770807Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Drop VM dma-resv lock on xesyncinfenceget failure in exec IOCTL

Upon failure all locks need to be dropped before returning to the user.

(cherry picked from commit 7d1a4258e602ffdce529f56686925034c1b3b095)

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
58480c1c912ff8146d067301a0d04cca318b4a66
Fixed
96397b1e25dda8389dea63ec914038a170bf953d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
58480c1c912ff8146d067301a0d04cca318b4a66
Fixed
64a2b6ed4bfd890a0e91955dd8ef8422a3944ed9

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.11.5
v6.11.6
v6.11.7
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.8
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@64a2b6ed4bfd890a0e91955dd8ef8422a3944ed9",
        "deprecated": false,
        "digest": {
            "function_hash": "101941022796734168928975656744881625352",
            "length": 5015.0
        },
        "target": {
            "function": "xe_exec_ioctl",
            "file": "drivers/gpu/drm/xe/xe_exec.c"
        },
        "id": "CVE-2024-53086-30274f9d",
        "signature_version": "v1",
        "signature_type": "Function"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@64a2b6ed4bfd890a0e91955dd8ef8422a3944ed9",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "210570822683797068319230569371389010608",
                "117749258040859485241730164698198661926",
                "94903302941801013164205190604091228213",
                "169832166910670155220684161757730748016"
            ]
        },
        "target": {
            "file": "drivers/gpu/drm/xe/xe_exec.c"
        },
        "id": "CVE-2024-53086-6d29ea26",
        "signature_version": "v1",
        "signature_type": "Line"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96397b1e25dda8389dea63ec914038a170bf953d",
        "deprecated": false,
        "digest": {
            "function_hash": "48174175567953353685305909895147062094",
            "length": 4696.0
        },
        "target": {
            "function": "xe_exec_ioctl",
            "file": "drivers/gpu/drm/xe/xe_exec.c"
        },
        "id": "CVE-2024-53086-a2dcfc82",
        "signature_version": "v1",
        "signature_type": "Function"
    },
    {
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@96397b1e25dda8389dea63ec914038a170bf953d",
        "deprecated": false,
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "210570822683797068319230569371389010608",
                "117749258040859485241730164698198661926",
                "94903302941801013164205190604091228213",
                "169832166910670155220684161757730748016"
            ]
        },
        "target": {
            "file": "drivers/gpu/drm/xe/xe_exec.c"
        },
        "id": "CVE-2024-53086-b875628b",
        "signature_version": "v1",
        "signature_type": "Line"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.11.8