CVE-2024-36944 (GCVE-0-2024-36944)
Vulnerability from cvelistv5
Published
2024-05-30 15:35
Modified
2025-05-04 09:12
Summary
In the Linux kernel, the following vulnerability has been resolved: Reapply "drm/qxl: simplify qxl_fence_wait" This reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea. Stephen Rostedt reports: "I went to run my tests on my VMs and the tests hung on boot up. Unfortunately, the most I ever got out was: [ 93.607888] Testing event system initcall: OK [ 93.667730] Running tests on all trace events: [ 93.669757] Testing all events: OK [ 95.631064] ------------[ cut here ]------------ Timed out after 60 seconds" and further debugging points to a possible circular locking dependency between the console_owner locking and the worker pool locking. Reverting the commit allows Steve's VM to boot to completion again. [ This may obviously result in the "[TTM] Buffer eviction failed" messages again, which was the reason for that original revert. But at this point this seems preferable to a non-booting system... ]
Impacted products
Vendor Product Version
Linux Linux Version: 8d278fc34cdd8a44e995fa93dfd31d619a2e1fe6
Version: 84fb60063509e462e39c0e097c7d6dbb71c95967
Version: 42cbe04a5c77da74fb7161b0ae63f1f6e105d633
Version: 13ab5db42a593f9904acc39055ee3ae75963fc88
Version: 07ed11afb68d94eadd4ffc082b97c2331307c5ea
Create a notification for this product.
   Linux Linux Version: 5.15.156   
Version: 6.1.87   
Version: 6.6.28   
Version: 6.8.7   
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-36944",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-31T18:28:13.498062Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T16:27:03.244Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T03:43:50.389Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/qxl/qxl_release.c",
            "include/linux/dma-fence.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea",
              "status": "affected",
              "version": "8d278fc34cdd8a44e995fa93dfd31d619a2e1fe6",
              "versionType": "git"
            },
            {
              "lessThan": "b548c53bc3ab83dc6fc86c8e840f013b2032267a",
              "status": "affected",
              "version": "84fb60063509e462e39c0e097c7d6dbb71c95967",
              "versionType": "git"
            },
            {
              "lessThan": "148ed8b4d64f94ab079c8f0d88c3f444db97ba97",
              "status": "affected",
              "version": "42cbe04a5c77da74fb7161b0ae63f1f6e105d633",
              "versionType": "git"
            },
            {
              "lessThan": "3dfe35d8683daf9ba69278643efbabe40000bbf6",
              "status": "affected",
              "version": "13ab5db42a593f9904acc39055ee3ae75963fc88",
              "versionType": "git"
            },
            {
              "lessThan": "3628e0383dd349f02f882e612ab6184e4bb3dc10",
              "status": "affected",
              "version": "07ed11afb68d94eadd4ffc082b97c2331307c5ea",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/gpu/drm/qxl/qxl_release.c",
            "include/linux/dma-fence.h"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "5.15.159",
              "status": "affected",
              "version": "5.15.156",
              "versionType": "semver"
            },
            {
              "lessThan": "6.1.91",
              "status": "affected",
              "version": "6.1.87",
              "versionType": "semver"
            },
            {
              "lessThan": "6.6.31",
              "status": "affected",
              "version": "6.6.28",
              "versionType": "semver"
            },
            {
              "lessThan": "6.8.10",
              "status": "affected",
              "version": "6.8.7",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.159",
                  "versionStartIncluding": "5.15.156",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.91",
                  "versionStartIncluding": "6.1.87",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.31",
                  "versionStartIncluding": "6.6.28",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.8.10",
                  "versionStartIncluding": "6.8.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nReapply \"drm/qxl: simplify qxl_fence_wait\"\n\nThis reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.\n\nStephen Rostedt reports:\n \"I went to run my tests on my VMs and the tests hung on boot up.\n  Unfortunately, the most I ever got out was:\n\n  [   93.607888] Testing event system initcall: OK\n  [   93.667730] Running tests on all trace events:\n  [   93.669757] Testing all events: OK\n  [   95.631064] ------------[ cut here ]------------\n  Timed out after 60 seconds\"\n\nand further debugging points to a possible circular locking dependency\nbetween the console_owner locking and the worker pool locking.\n\nReverting the commit allows Steve\u0027s VM to boot to completion again.\n\n[ This may obviously result in the \"[TTM] Buffer eviction failed\"\n  messages again, which was the reason for that original revert. But at\n  this point this seems preferable to a non-booting system... ]"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T09:12:33.769Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea"
        },
        {
          "url": "https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a"
        },
        {
          "url": "https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97"
        },
        {
          "url": "https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6"
        },
        {
          "url": "https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10"
        }
      ],
      "title": "Reapply \"drm/qxl: simplify qxl_fence_wait\"",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-36944",
    "datePublished": "2024-05-30T15:35:42.708Z",
    "dateReserved": "2024-05-30T15:25:07.073Z",
    "dateUpdated": "2025-05-04T09:12:33.769Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nReapply \\\"drm/qxl: simplify qxl_fence_wait\\\"\\n\\nThis reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.\\n\\nStephen Rostedt reports:\\n \\\"I went to run my tests on my VMs and the tests hung on boot up.\\n  Unfortunately, the most I ever got out was:\\n\\n  [   93.607888] Testing event system initcall: OK\\n  [   93.667730] Running tests on all trace events:\\n  [   93.669757] Testing all events: OK\\n  [   95.631064] ------------[ cut here ]------------\\n  Timed out after 60 seconds\\\"\\n\\nand further debugging points to a possible circular locking dependency\\nbetween the console_owner locking and the worker pool locking.\\n\\nReverting the commit allows Steve\u0027s VM to boot to completion again.\\n\\n[ This may obviously result in the \\\"[TTM] Buffer eviction failed\\\"\\n  messages again, which was the reason for that original revert. But at\\n  this point this seems preferable to a non-booting system... ]\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: Vuelva a aplicar \\\"drm/qxl: simplificar qxl_fence_wait\\\" Esto revierte el commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea. Stephen Rostedt informa: \\\"Fui a ejecutar mis pruebas en mis m\\u00e1quinas virtuales y las pruebas se colgaron al arrancar. Desafortunadamente, lo m\\u00e1ximo que obtuve fue: [ 93.607888] Probando evento de initcall del sistema: OK [ 93.667730] Ejecutando pruebas en todos los eventos de seguimiento : [93.669757] Probando todos los eventos: OK [95.631064] ------------[ cortar aqu\\u00ed ]------------ Se agot\\u00f3 el tiempo de espera despu\\u00e9s de 60 segundos\\\" y m\\u00e1s puntos de depuraci\\u00f3n a una posible dependencia de bloqueo circular entre el bloqueo del propietario de la consola y el bloqueo del grupo de trabajadores. Revertir el commit permite que la m\\u00e1quina virtual de Steve se inicie nuevamente. [Obviamente, esto puede provocar que aparezcan nuevamente los mensajes \\\"[TTM] Error en el desalojo del b\\u00fafer\\\", que fue el motivo de la reversi\\u00f3n original. Pero en este punto esto parece preferible a un sistema sin arranque...]\"}]",
      "id": "CVE-2024-36944",
      "lastModified": "2024-11-21T09:22:52.540",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2024-05-30T16:15:17.387",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-36944\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-05-30T16:15:17.387\",\"lastModified\":\"2025-04-01T18:35:48.893\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nReapply \\\"drm/qxl: simplify qxl_fence_wait\\\"\\n\\nThis reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.\\n\\nStephen Rostedt reports:\\n \\\"I went to run my tests on my VMs and the tests hung on boot up.\\n  Unfortunately, the most I ever got out was:\\n\\n  [   93.607888] Testing event system initcall: OK\\n  [   93.667730] Running tests on all trace events:\\n  [   93.669757] Testing all events: OK\\n  [   95.631064] ------------[ cut here ]------------\\n  Timed out after 60 seconds\\\"\\n\\nand further debugging points to a possible circular locking dependency\\nbetween the console_owner locking and the worker pool locking.\\n\\nReverting the commit allows Steve\u0027s VM to boot to completion again.\\n\\n[ This may obviously result in the \\\"[TTM] Buffer eviction failed\\\"\\n  messages again, which was the reason for that original revert. But at\\n  this point this seems preferable to a non-booting system... ]\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Vuelva a aplicar \\\"drm/qxl: simplificar qxl_fence_wait\\\" Esto revierte el commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea. Stephen Rostedt informa: \\\"Fui a ejecutar mis pruebas en mis m\u00e1quinas virtuales y las pruebas se colgaron al arrancar. Desafortunadamente, lo m\u00e1ximo que obtuve fue: [ 93.607888] Probando evento de initcall del sistema: OK [ 93.667730] Ejecutando pruebas en todos los eventos de seguimiento : [93.669757] Probando todos los eventos: OK [95.631064] ------------[ cortar aqu\u00ed ]------------ Se agot\u00f3 el tiempo de espera despu\u00e9s de 60 segundos\\\" y m\u00e1s puntos de depuraci\u00f3n a una posible dependencia de bloqueo circular entre el bloqueo del propietario de la consola y el bloqueo del grupo de trabajadores. Revertir el commit permite que la m\u00e1quina virtual de Steve se inicie nuevamente. [Obviamente, esto puede provocar que aparezcan nuevamente los mensajes \\\"[TTM] Error en el desalojo del b\u00fafer\\\", que fue el motivo de la reversi\u00f3n original. Pero en este punto esto parece preferible a un sistema sin arranque...]\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15.156\",\"versionEndExcluding\":\"5.15.159\",\"matchCriteriaId\":\"EA57F6BC-BBCE-40CC-9EC2-563034F35334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1.87\",\"versionEndExcluding\":\"6.1.91\",\"matchCriteriaId\":\"CBE1A224-11AE-42CC-800B-EE178BEF8F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.6.28\",\"versionEndExcluding\":\"6.6.31\",\"matchCriteriaId\":\"63A01D9F-55CD-45D4-B116-132A9765BDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.8.7\",\"versionEndExcluding\":\"6.8.10\",\"matchCriteriaId\":\"90761A97-4B3B-458A-8980-4803930E0A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"22BEDD49-2C6D-402D-9DBF-6646F6ECD10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"52048DDA-FC5A-4363-95A0-A6357B4D7F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06B2CCF-3F43-4FA9-8773-C83C3F5764B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F850DCEC-E08B-4317-A33B-D2DCF39F601B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"91326417-E981-482E-A5A3-28BC1327521B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAECDCD8-F556-4606-8D7B-5C6D47A501F2\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:43:50.389Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-36944\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-31T18:28:13.498062Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-31T18:28:18.335Z\"}}], \"cna\": {\"title\": \"Reapply \\\"drm/qxl: simplify qxl_fence_wait\\\"\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"8d278fc34cdd8a44e995fa93dfd31d619a2e1fe6\", \"lessThan\": \"4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"84fb60063509e462e39c0e097c7d6dbb71c95967\", \"lessThan\": \"b548c53bc3ab83dc6fc86c8e840f013b2032267a\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"42cbe04a5c77da74fb7161b0ae63f1f6e105d633\", \"lessThan\": \"148ed8b4d64f94ab079c8f0d88c3f444db97ba97\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"13ab5db42a593f9904acc39055ee3ae75963fc88\", \"lessThan\": \"3dfe35d8683daf9ba69278643efbabe40000bbf6\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"07ed11afb68d94eadd4ffc082b97c2331307c5ea\", \"lessThan\": \"3628e0383dd349f02f882e612ab6184e4bb3dc10\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/gpu/drm/qxl/qxl_release.c\", \"include/linux/dma-fence.h\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.15.156\", \"lessThan\": \"5.15.159\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"6.1.87\", \"lessThan\": \"6.1.91\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"6.6.28\", \"lessThan\": \"6.6.31\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"6.8.7\", \"lessThan\": \"6.8.10\", \"versionType\": \"semver\"}], \"programFiles\": [\"drivers/gpu/drm/qxl/qxl_release.c\", \"include/linux/dma-fence.h\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea\"}, {\"url\": \"https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a\"}, {\"url\": \"https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97\"}, {\"url\": \"https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6\"}, {\"url\": \"https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nReapply \\\"drm/qxl: simplify qxl_fence_wait\\\"\\n\\nThis reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.\\n\\nStephen Rostedt reports:\\n \\\"I went to run my tests on my VMs and the tests hung on boot up.\\n  Unfortunately, the most I ever got out was:\\n\\n  [   93.607888] Testing event system initcall: OK\\n  [   93.667730] Running tests on all trace events:\\n  [   93.669757] Testing all events: OK\\n  [   95.631064] ------------[ cut here ]------------\\n  Timed out after 60 seconds\\\"\\n\\nand further debugging points to a possible circular locking dependency\\nbetween the console_owner locking and the worker pool locking.\\n\\nReverting the commit allows Steve\u0027s VM to boot to completion again.\\n\\n[ This may obviously result in the \\\"[TTM] Buffer eviction failed\\\"\\n  messages again, which was the reason for that original revert. But at\\n  this point this seems preferable to a non-booting system... ]\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-02-27T01:57:23.222Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-36944\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-27T01:57:23.222Z\", \"dateReserved\": \"2024-05-30T15:25:07.073Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-05-30T15:35:42.708Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}