
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-49943 affects the Linux kernel's drm/xe/gucsubmit component. The vulnerability was discovered in the wedgedfini function where any non-wedged queue can have a zero refcount and run concurrently with an async queue destroy operation. This can lead to a Use-After-Free (UAF) condition when dereferencing the queue pointer to check wedge status after the lookup if the queue is not wedged (NVD).
The vulnerability stems from improper locking in the wedgedfini function of the Linux kernel's DRM/XE GuC submit component. The issue occurs because the submissionstate lock is not held while checking the wedge status, which can lead to a race condition. The CVSS v3.1 base score is 5.5 MEDIUM (Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). The vulnerability is classified as CWE-667 (Improper Locking) (NVD).
The vulnerability can result in a Use-After-Free condition, which could lead to system crashes or potential privilege escalation. The issue affects Linux kernel versions from 6.11 up to (excluding) 6.11.3 (NVD).
The vulnerability has been fixed by keeping the submission_state lock held around the check to postpone the free and make the check safe, before dropping again around the put() to avoid deadlock. The fix is available in Linux kernel version 6.11.3 and later (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."