CVE-2024-35786: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix stale locked mutex in nouveau_gem_ioctl_pushbuf If VM_BIND is enabled on the client the legacy submission ioctl can't be used, however if a client tries to do so regardless it will return an error. In this case the clients mutex remained unlocked leading to a deadlock inside nouveau_drm_postclose or any other nouveau ioctl call.
AI Analysis
Technical Summary
CVE-2024-35786 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the nouveau driver, which is an open-source driver for NVIDIA graphics cards. The flaw arises in the handling of mutex locks during ioctl calls related to buffer submission. When VM_BIND is enabled on the client side, the legacy submission ioctl is disabled and returns an error if used. However, the client’s mutex remains unlocked in this error scenario, leading to a stale locked mutex condition. This results in a deadlock situation during subsequent nouveau ioctl calls such as nouveau_drm_postclose. Essentially, the kernel driver fails to properly manage synchronization primitives under certain error conditions, causing the affected process or system components to hang indefinitely. This deadlock can impact system stability and availability, particularly for systems relying on the nouveau driver for GPU management. The vulnerability does not require user interaction or authentication to be triggered if the client attempts to use the legacy ioctl improperly, but it does depend on the presence of VM_BIND being enabled and the use of the nouveau driver. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. The issue has been addressed in recent Linux kernel updates, and users are advised to apply patches promptly.
Potential Impact
For European organizations, the impact of CVE-2024-35786 primarily concerns system availability and stability on Linux systems using the nouveau driver with VM_BIND enabled. Organizations relying on Linux servers or workstations with NVIDIA GPUs managed by nouveau could experience system hangs or deadlocks, potentially disrupting critical services, graphical workloads, or compute tasks. This could affect sectors such as research institutions, media production companies, and enterprises using Linux-based infrastructure for GPU-accelerated applications. While the vulnerability does not directly compromise confidentiality or integrity, the denial-of-service-like effect caused by deadlocks could lead to operational downtime and productivity loss. In environments where high availability is critical, such as financial services or industrial control systems, this could have cascading effects. However, the impact is limited to systems with the specific driver and configuration, reducing the overall attack surface. Since no active exploits are known, the immediate risk is moderate but could increase if exploitation techniques emerge.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems using the nouveau driver, especially those with VM_BIND enabled. 2) Apply the latest Linux kernel patches that address CVE-2024-35786 as soon as they become available from trusted Linux distributions or kernel maintainers. 3) Where possible, consider using the proprietary NVIDIA driver as an alternative if it meets organizational requirements and does not expose other vulnerabilities. 4) Implement monitoring for system hangs or deadlocks related to GPU operations to detect potential exploitation attempts or system instability early. 5) In environments where GPU usage is critical, perform thorough testing of kernel updates in staging environments to ensure stability before deployment. 6) Educate system administrators about the specific conditions triggering the deadlock to avoid misconfiguration or legacy ioctl usage that could inadvertently cause the issue. 7) Maintain regular backups and system snapshots to enable quick recovery in case of system hangs or crashes.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2024-35786: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/nouveau: fix stale locked mutex in nouveau_gem_ioctl_pushbuf If VM_BIND is enabled on the client the legacy submission ioctl can't be used, however if a client tries to do so regardless it will return an error. In this case the clients mutex remained unlocked leading to a deadlock inside nouveau_drm_postclose or any other nouveau ioctl call.
AI-Powered Analysis
Technical Analysis
CVE-2024-35786 is a vulnerability identified in the Linux kernel's Direct Rendering Manager (DRM) subsystem, specifically within the nouveau driver, which is an open-source driver for NVIDIA graphics cards. The flaw arises in the handling of mutex locks during ioctl calls related to buffer submission. When VM_BIND is enabled on the client side, the legacy submission ioctl is disabled and returns an error if used. However, the client’s mutex remains unlocked in this error scenario, leading to a stale locked mutex condition. This results in a deadlock situation during subsequent nouveau ioctl calls such as nouveau_drm_postclose. Essentially, the kernel driver fails to properly manage synchronization primitives under certain error conditions, causing the affected process or system components to hang indefinitely. This deadlock can impact system stability and availability, particularly for systems relying on the nouveau driver for GPU management. The vulnerability does not require user interaction or authentication to be triggered if the client attempts to use the legacy ioctl improperly, but it does depend on the presence of VM_BIND being enabled and the use of the nouveau driver. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. The issue has been addressed in recent Linux kernel updates, and users are advised to apply patches promptly.
Potential Impact
For European organizations, the impact of CVE-2024-35786 primarily concerns system availability and stability on Linux systems using the nouveau driver with VM_BIND enabled. Organizations relying on Linux servers or workstations with NVIDIA GPUs managed by nouveau could experience system hangs or deadlocks, potentially disrupting critical services, graphical workloads, or compute tasks. This could affect sectors such as research institutions, media production companies, and enterprises using Linux-based infrastructure for GPU-accelerated applications. While the vulnerability does not directly compromise confidentiality or integrity, the denial-of-service-like effect caused by deadlocks could lead to operational downtime and productivity loss. In environments where high availability is critical, such as financial services or industrial control systems, this could have cascading effects. However, the impact is limited to systems with the specific driver and configuration, reducing the overall attack surface. Since no active exploits are known, the immediate risk is moderate but could increase if exploitation techniques emerge.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Identify Linux systems using the nouveau driver, especially those with VM_BIND enabled. 2) Apply the latest Linux kernel patches that address CVE-2024-35786 as soon as they become available from trusted Linux distributions or kernel maintainers. 3) Where possible, consider using the proprietary NVIDIA driver as an alternative if it meets organizational requirements and does not expose other vulnerabilities. 4) Implement monitoring for system hangs or deadlocks related to GPU operations to detect potential exploitation attempts or system instability early. 5) In environments where GPU usage is critical, perform thorough testing of kernel updates in staging environments to ensure stability before deployment. 6) Educate system administrators about the specific conditions triggering the deadlock to avoid misconfiguration or legacy ioctl usage that could inadvertently cause the issue. 7) Maintain regular backups and system snapshots to enable quick recovery in case of system hangs or crashes.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T12:19:12.338Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3489
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 3:55:41 PM
Last updated: 7/28/2025, 10:34:54 PM
Views: 10
Related Threats
CVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-27845: n/a
UnknownCVE-2025-7972: CWE-286: Incorrect User Management in Rockwell Automation FactoryTalk® Linx
HighCVE-2025-8876: CWE-20 Improper Input Validation in N-able N-central
CriticalCVE-2025-8875: CWE-502 Deserialization of Untrusted Data in N-able N-central
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.