cve-2024-36022
Vulnerability from cvelistv5
Published
2024-05-30 15:03
Modified
2024-08-02 03:30
Severity
Summary
drm/amdgpu: Init zone device and drm client after mode-1 reset on reload
Impacted products
VendorProduct
LinuxLinux
LinuxLinux
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36022",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-17T15:47:25.866297Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-17T15:47:28.491Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:30:12.863Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.c",
            "drivers/gpu/drm/amd/amdgpu/amdgpu_drv.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4f8154f77519",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            },
            {
              "lessThan": "f679fd6057fb",
              "status": "affected",
              "version": "1da177e4c3f4",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/amd/amdgpu/amdgpu_amdkfd.c",
            "drivers/gpu/drm/amd/amdgpu/amdgpu_drv.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThanOrEqual": "6.8.*",
              "status": "unaffected",
              "version": "6.8.6",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.9",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Init zone device and drm client after mode-1 reset on reload\n\nIn passthrough environment, when amdgpu is reloaded after unload, mode-1\nis triggered after initializing the necessary IPs, That init does not\ninclude KFD, and KFD init waits until the reset is completed. KFD init\nis called in the reset handler, but in this case, the zone device and\ndrm client is not initialized, causing app to create kernel panic.\n\nv2: Removing the init KFD condition from amdgpu_amdkfd_drm_client_create.\nAs the previous version has the potential of creating DRM client twice.\n\nv3: v2 patch results in SDMA engine hung as DRM open causes VM clear to SDMA\nbefore SDMA init. Adding the condition to in drm client creation, on top of v1,\nto guard against drm client creation call multiple times."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-30T15:03:59.678Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6"
        },
        {
          "url": "https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48"
        }
      ],
      "title": "drm/amdgpu: Init zone device and drm client after mode-1 reset on reload",
      "x_generator": {
        "engine": "bippy-a5840b7849dd"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-36022",
    "datePublished": "2024-05-30T15:03:59.678Z",
    "dateReserved": "2024-05-17T13:50:33.157Z",
    "dateUpdated": "2024-08-02T03:30:12.863Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-36022\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-30T15:15:49.263\",\"lastModified\":\"2024-05-30T18:19:11.743\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/amdgpu: Init zone device and drm client after mode-1 reset on reload\\n\\nIn passthrough environment, when amdgpu is reloaded after unload, mode-1\\nis triggered after initializing the necessary IPs, That init does not\\ninclude KFD, and KFD init waits until the reset is completed. KFD init\\nis called in the reset handler, but in this case, the zone device and\\ndrm client is not initialized, causing app to create kernel panic.\\n\\nv2: Removing the init KFD condition from amdgpu_amdkfd_drm_client_create.\\nAs the previous version has the potential of creating DRM client twice.\\n\\nv3: v2 patch results in SDMA engine hung as DRM open causes VM clear to SDMA\\nbefore SDMA init. Adding the condition to in drm client creation, on top of v1,\\nto guard against drm client creation call multiple times.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: dispositivo de zona de inicio y cliente drm despu\u00e9s del restablecimiento del modo 1 al recargar. En el entorno de paso a trav\u00e9s, cuando amdgpu se recarga despu\u00e9s de la descarga, el modo 1 se activa despu\u00e9s de inicializar las IP necesarias. Ese inicio no incluye KFD, y el inicio de KFD espera hasta que se complete el reinicio. Se llama a KFD init en el controlador de reinicio, pero en este caso, el dispositivo de zona y el cliente drm no se inicializan, lo que hace que la aplicaci\u00f3n genere p\u00e1nico en el kernel. v2: Eliminaci\u00f3n de la condici\u00f3n KFD inicial de amdgpu_amdkfd_drm_client_create. Como la versi\u00f3n anterior tiene el potencial de crear un cliente DRM dos veces. v3: el parche v2 hace que el motor SDMA se bloquee porque la apertura de DRM hace que la VM se borre a SDMA antes de que se inicie SDMA. Agregar la condici\u00f3n a la creaci\u00f3n del cliente DRM, adem\u00e1s de la versi\u00f3n 1, para protegerse contra llamadas de creaci\u00f3n del cliente DRM varias veces.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...