{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:21:07.658","vulnerabilities":[{"cve":{"id":"CVE-2024-37026","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-06-24T14:15:12.307","lastModified":"2025-10-03T15:08:31.047","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Only use reserved BCS instances for usm migrate exec queue\n\nThe GuC context scheduling queue is 2 entires deep, thus it is possible\nfor a migration job to be stuck behind a fault if migration exec queue\nshares engines with user jobs. This can deadlock as the migrate exec\nqueue is required to service page faults. Avoid deadlock by only using\nreserved BCS instances for usm migrate exec queue.\n\n(cherry picked from commit 04f4a70a183a688a60fe3882d6e4236ea02cfc67)"},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/xe: solo use instancias BCS reservadas para la cola ejecutiva de migración de usm. La cola de programación de contexto GuC tiene 2 enteros de profundidad, por lo tanto, es posible que un trabajo de migración quede atascado detrás de una falla si la cola ejecutiva de migración comparte motores con los trabajos de los usuarios. Esto puede bloquearse ya que se requiere la cola de ejecución de migración para solucionar los errores de la página. Evite el punto muerto utilizando únicamente instancias BCS reservadas para la cola ejecutiva de migración de usm. (cereza escogida del commit 04f4a70a183a688a60fe3882d6e4236ea02cfc67)"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8","versionEndExcluding":"6.9.4","matchCriteriaId":"02BBA32B-4F0B-43D9-BA15-A273D6A896D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*","matchCriteriaId":"2EBB4392-5FA6-4DA9-9772-8F9C750109FA"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/92deed4a9bfd9ef187764225bba530116c49e15c","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c8ea2c31f5ea437199b239d76ad5db27343edb0c","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/92deed4a9bfd9ef187764225bba530116c49e15c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c8ea2c31f5ea437199b239d76ad5db27343edb0c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}