cve-2024-35952
Vulnerability from cvelistv5
Published
2024-05-20 09:41
Modified
2024-11-05 09:25
Severity ?
Summary
drm/ast: Fix soft lockup
Impacted products
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:21:49.044Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a81b2acd43e24e419f65df97348c76a5a1496066"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/35768baf0fdfc47ede42d899506bad78450e9294"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/bc004f5038220b1891ef4107134ccae44be55109"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-35952",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T15:40:45.917761Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:32:48.783Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/ast/ast_dp.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "8a6fea3fcb57",
              "status": "affected",
              "version": "594e9c04b586",
              "versionType": "git"
            },
            {
              "lessThan": "a81b2acd43e2",
              "status": "affected",
              "version": "594e9c04b586",
              "versionType": "git"
            },
            {
              "lessThan": "35768baf0fdf",
              "status": "affected",
              "version": "594e9c04b586",
              "versionType": "git"
            },
            {
              "lessThan": "bc004f503822",
              "status": "affected",
              "version": "594e9c04b586",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/ast/ast_dp.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.19"
            },
            {
              "lessThan": "5.19",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.87",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.28",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.8.*",
              "status": "unaffected",
              "version": "6.8.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.9",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/ast: Fix soft lockup\n\nThere is a while-loop in ast_dp_set_on_off() that could lead to\ninfinite-loop. This is because the register, VGACRI-Dx, checked in\nthis API is a scratch register actually controlled by a MCU, named\nDPMCU, in BMC.\n\nThese scratch registers are protected by scu-lock. If suc-lock is not\noff, DPMCU can not update these registers and then host will have soft\nlockup due to never updated status.\n\nDPMCU is used to control DP and relative registers to handshake with\nhost\u0027s VGA driver. Even the most time-consuming task, DP\u0027s link\ntraining, is less than 100ms. 200ms should be enough."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-05T09:25:35.484Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb"
        },
        {
          "url": "https://git.kernel.org/stable/c/a81b2acd43e24e419f65df97348c76a5a1496066"
        },
        {
          "url": "https://git.kernel.org/stable/c/35768baf0fdfc47ede42d899506bad78450e9294"
        },
        {
          "url": "https://git.kernel.org/stable/c/bc004f5038220b1891ef4107134ccae44be55109"
        }
      ],
      "title": "drm/ast: Fix soft lockup",
      "x_generator": {
        "engine": "bippy-9e1c9544281a"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-35952",
    "datePublished": "2024-05-20T09:41:46.656Z",
    "dateReserved": "2024-05-17T13:50:33.135Z",
    "dateUpdated": "2024-11-05T09:25:35.484Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-35952\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-20T10:15:10.643\",\"lastModified\":\"2024-05-20T13:00:04.957\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/ast: Fix soft lockup\\n\\nThere is a while-loop in ast_dp_set_on_off() that could lead to\\ninfinite-loop. This is because the register, VGACRI-Dx, checked in\\nthis API is a scratch register actually controlled by a MCU, named\\nDPMCU, in BMC.\\n\\nThese scratch registers are protected by scu-lock. If suc-lock is not\\noff, DPMCU can not update these registers and then host will have soft\\nlockup due to never updated status.\\n\\nDPMCU is used to control DP and relative registers to handshake with\\nhost\u0027s VGA driver. Even the most time-consuming task, DP\u0027s link\\ntraining, is less than 100ms. 200ms should be enough.\"},{\"lang\":\"es\",\"value\":\" En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/ast: corrige el bloqueo suave. Hay un bucle while en ast_dp_set_on_off() que podr\u00eda generar un bucle infinito. Esto se debe a que el registro, VGACRI-Dx, marcado en esta API es un registro temporal en realidad controlado por una MCU, denominada DPMCU, en BMC. Estos registros de scratch est\u00e1n protegidos por scu-lock. Si suc-lock no est\u00e1 desactivado, DPMCU no puede actualizar estos registros y luego el host tendr\u00e1 un bloqueo suave debido a que el estado nunca se actualiz\u00f3. DPMCU se utiliza para controlar DP y los registros relativos al protocolo de enlace con el controlador VGA del host. Incluso la tarea que consume m\u00e1s tiempo, el entrenamiento de enlaces de DP, dura menos de 100 ms. 200 ms deber\u00edan ser suficientes.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/35768baf0fdfc47ede42d899506bad78450e9294\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a81b2acd43e24e419f65df97348c76a5a1496066\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bc004f5038220b1891ef4107134ccae44be55109\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.