CVE-2024-27411
drm/nouveau: keep DMA buffers required for suspend/resume
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: keep DMA buffers required for suspend/resume Nouveau deallocates a few buffers post GPU init which are required for GPU suspend/resume to function correctly.
This is likely not as big an issue on systems where the NVGPU is the only GPU, but on multi-GPU set ups it leads to a regression where the kernel module errors and results in a system-wide rendering freeze. This commit addresses that regression by moving the two buffers required for suspend and resume to be deallocated at driver unload instead of post init.
En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/nouveau: mantiene los buffers DMA necesarios para suspender/reanudar Nouveau desasigna algunos buffers después del inicio de GPU que son necesarios para que la suspensión/reanudación de GPU funcione correctamente. Probablemente esto no sea un problema tan grande en sistemas donde la NVGPU es la única GPU, pero en configuraciones de múltiples GPU conduce a una regresión en la que el módulo del kernel genera errores y provoca una congelación de la representación en todo el sistema. Esta confirmación soluciona esa regresión moviendo los dos buffers necesarios para suspender y reanudar para que se desasignen durante la descarga del controlador en lugar de después del inicio.
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: keep DMA buffers required for suspend/resume Nouveau deallocates a few buffers post GPU init which are required for GPU suspend/resume to function correctly. This is likely not as big an issue on systems where the NVGPU is the only GPU, but on multi-GPU set ups it leads to a regression where the kernel module errors and results in a system-wide rendering freeze. This commit addresses that regression by moving the two buffers required for suspend and resume to be deallocated at driver unload instead of post init.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-02-25 CVE Reserved
- 2024-05-17 CVE Published
- 2024-05-18 EPSS Updated
- 2024-12-19 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://git.kernel.org/stable/c/6190d4c08897d748dd25f0b78267a90aa1694e15 | Vuln. Introduced |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://git.kernel.org/stable/c/be00e15b240ed71fc30c0576af7ab670c8271661 | 2024-03-06 | |
https://git.kernel.org/stable/c/f6ecfdad359a01c7fd8a3bcfde3ef0acdf107e6e | 2024-03-01 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 6.7.6 < 6.7.9 Search vendor "Linux" for product "Linux Kernel" and version " >= 6.7.6 < 6.7.9" | en |
Affected
|