In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Use reserved copy engine for user binds on faulting devices
User binds map to engines with can fault, faults depend on user binds
completion, thus we can deadlock. Avoid this by using reserved copy
engine for user binds on faulting devices.
While we are here, normalize bind queue creation with a helper.
v2:
- Pass in extensions to bind queue creation (CI)
v3:
- s/resevered/reserved (Lucas)
- Fix NULL hwe check (Jonathan)
Metrics
Affected Vendors & Products
References
History
Wed, 01 Jan 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-674 |
Wed, 23 Oct 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
Tue, 22 Oct 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 21 Oct 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 21 Oct 2024 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: drm/xe: Use reserved copy engine for user binds on faulting devices User binds map to engines with can fault, faults depend on user binds completion, thus we can deadlock. Avoid this by using reserved copy engine for user binds on faulting devices. While we are here, normalize bind queue creation with a helper. v2: - Pass in extensions to bind queue creation (CI) v3: - s/resevered/reserved (Lucas) - Fix NULL hwe check (Jonathan) | |
Title | drm/xe: Use reserved copy engine for user binds on faulting devices | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2024-10-21T12:14:01.685Z
Updated: 2024-12-19T09:26:55.727Z
Reserved: 2024-09-30T16:00:12.957Z
Link: CVE-2024-47729

Updated: 2024-10-21T13:00:49.009Z

Status : Analyzed
Published: 2024-10-21T13:15:03.070
Modified: 2024-10-23T20:40:24.640
Link: CVE-2024-47729
