Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2024-36944
HistoryMay 30, 2024 - 4:15 p.m.

CVE-2024-36944

2024-05-3016:15:17
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
linux kernel
vulnerability
drm/qxl
simplify qxl_fence_wait
commit
stephen rostedt
vms
tests
hang
boot
circular locking dependency
console_owner
worker pool
buffer eviction failed
non-booting system

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%

In the Linux kernel, the following vulnerability has been resolved:

Reapply “drm/qxl: simplify qxl_fence_wait”

This reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.

Stephen Rostedt reports:
"I went to run my tests on my VMs and the tests hung on boot up.
Unfortunately, the most I ever got out was:

[ 93.607888] Testing event system initcall: OK
[ 93.667730] Running tests on all trace events:
[ 93.669757] Testing all events: OK
[ 95.631064] ------------[ cut here ]------------
Timed out after 60 seconds"

and further debugging points to a possible circular locking dependency
between the console_owner locking and the worker pool locking.

Reverting the commit allows Steve’s VM to boot to completion again.

[ This may obviously result in the “[TTM] Buffer eviction failed”
messages again, which was the reason for that original revert. But at
this point this seems preferable to a non-booting system… ]

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

15.7%