{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T07:31:38.472","vulnerabilities":[{"cve":{"id":"CVE-2024-43863","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-08-21T00:15:04.847","lastModified":"2025-11-03T22:18:13.523","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a deadlock in dma buf fence polling\n\nIntroduce a version of the fence ops that on release doesn't remove\nthe fence from the pending list, and thus doesn't require a lock to\nfix poll->fence wait->fence unref deadlocks.\n\nvmwgfx overwrites the wait callback to iterate over the list of all\nfences and update their status, to do that it holds a lock to prevent\nthe list modifcations from other threads. The fence destroy callback\nboth deletes the fence and removes it from the list of pending\nfences, for which it holds a lock.\n\ndma buf polling cb unrefs a fence after it's been signaled: so the poll\ncalls the wait, which signals the fences, which are being destroyed.\nThe destruction tries to acquire the lock on the pending fences list\nwhich it can never get because it's held by the wait from which it\nwas called.\n\nOld bug, but not a lot of userspace apps were using dma-buf polling\ninterfaces. Fix those, in particular this fixes KDE stalls/deadlock."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: soluciona un punto muerto en el sondeo de valla de dma buf. Introduce una versión de las operaciones de valla que, al lanzarse, no elimina la valla de la lista de pendientes y, por tanto, no requiere un bloqueo para arreglar los puntos muertos de encuesta-&gt;espera de valla-&gt;cerca sin referencia. vmwgfx sobrescribe la devolución de llamada de espera para iterar sobre la lista de todas las barreras y actualizar su estado; para ello, mantiene un bloqueo para evitar que otros subprocesos modifiquen la lista. La devolución de llamada de destrucción de valla elimina la valla y la elimina de la lista de vallas pendientes, para las cuales mantiene un bloqueo. dma buf polling cb desrefs una valla después de haber sido señalada: entonces la encuesta llama a la espera, lo que señala las vallas que están siendo destruidas. La destrucción intenta adquirir el bloqueo en la lista de vallas pendientes que nunca puede conseguir porque está retenido por la espera desde la que fue llamado. Error antiguo, pero no muchas aplicaciones de espacio de usuario usaban interfaces de sondeo dma-buf. Solucionarlos, en particular esto soluciona los bloqueos/bloqueos de KDE."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-667"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18","versionEndExcluding":"5.15.165","matchCriteriaId":"A02B7BA9-C2B0-475F-9401-338FBF89D50C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.104","matchCriteriaId":"20DB9042-F89E-4024-B005-ACBBA99CA659"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.45","matchCriteriaId":"6ED8FBDF-48EE-4FEB-8B1A-CFF4FBCB27BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.10.4","matchCriteriaId":"1F9FECDC-6CB8-41E5-B32A-E46776100D9C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*","matchCriteriaId":"8B3CE743-2126-47A3-8B7C-822B502CF119"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/3b933b16c996af8adb6bc1b5748a63dfb41a82bc","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/9908dc0d2ef0e4aec8a242c098455729c0e2f017","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/9e20d028d8d1deb1e7fed18f22ffc01669cf3237","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/a8943969f9ead2fd3044fc826140a21622ef830e","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/c98ab18b9f315ff977c2c65d7c71298ef98be8e3","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/e58337100721f3cc0c7424a18730e4f39844934f","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}