-

CVE-2026-43381

nouveau/dpcd: return EBUSY for aux xfer if the device is asleep

In the Linux kernel, the following vulnerability has been resolved:

nouveau/dpcd: return EBUSY for aux xfer if the device is asleep

If we have runtime suspended, and userspace wants to use /dev/drm_dp_*
then just tell it the device is busy instead of crashing in the GSP
code.

WARNING: CPU: 2 PID: 565741 at drivers/gpu/drm/nouveau/nvkm/subdev/gsp/rm/r535/rpc.c:164 r535_gsp_msgq_wait+0x9a/0xb0 [nouveau]
CPU: 2 UID: 0 PID: 565741 Comm: fwupd Not tainted 6.18.10-200.fc43.x86_64 #1 PREEMPT(lazy)
Hardware name: LENOVO 20QTS0PQ00/20QTS0PQ00, BIOS N2OET65W (1.52 ) 08/05/2024
RIP: 0010:r535_gsp_msgq_wait+0x9a/0xb0 [nouveau]

This is a simple fix to get backported. We should probably engineer a
proper power domain solution to wake up devices and keep them awake
while fw updates are happening.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < 178df7c91e6c202579284df9f79d1592a514cdcf
Status affected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < 4df518aa196085909fd7e32518ecd27fba60ed69
Status affected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < cd24cab2023aa46b595bc6b9cc39d8973d9d0a8c
Status affected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < fad178ae894930520519ead3c8e0150641466360
Status affected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < 6bdd2d70c338d52c387d3b3aadc596784ae81b01
Status affected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < ad8fa5bff53f5d1f8394f996850da8ce070eaee3
Status affected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < 24639553a016578222ac597db924dfb6fa5ec8b5
Status affected
Version 8894f4919bc43f821775db2cfff4b917871b2102
Version < 8f3c6f08ababad2e3bdd239728cf66a9949446b4
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.16
Status affected
Version 0
Version < 3.16
Status unaffected
Version <= 5.10.*
Version 5.10.253
Status unaffected
Version <= 5.15.*
Version 5.15.203
Status unaffected
Version <= 6.1.*
Version 6.1.167
Status unaffected
Version <= 6.6.*
Version 6.6.130
Status unaffected
Version <= 6.12.*
Version 6.12.78
Status unaffected
Version <= 6.18.*
Version 6.18.19
Status unaffected
Version <= 6.19.*
Version 6.19.9
Status unaffected
Version <= *
Version 7.0
Status unaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.094
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.