In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Prevent unmapping active read buffers
The kms paths keep a persistent map active to read and compare the cursor
buffer. These maps can race with each other in simple scenario where:
a) buffer "a" mapped for update
b) buffer "a" mapped for compare
c) do the compare
d) unmap "a" for compare
e) update the cursor
f) unmap "a" for update
At step "e" the buffer has been unmapped and the read contents is bogus.
Prevent unmapping of active read buffers by simply keeping a count of
how many paths have currently active maps and unmap only when the count
reaches 0.
References
Configurations
Configuration 1 (hide)
|
History
17 Oct 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Oct 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
19 Sep 2024, 13:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/aba07b9a0587f50e5d3346eaa19019cf3f86c0ea - Patch | |
References | () https://git.kernel.org/stable/c/d5228d158e4c0b1663b3983044913c15c3d0135e - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* |
|
First Time |
Linux
Linux linux Kernel |
13 Sep 2024, 14:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Sep 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-13 07:15
Updated : 2024-10-17 14:15
NVD link : CVE-2024-46710
Mitre link : CVE-2024-46710
CVE.ORG link : CVE-2024-46710
JSON object : View
Products Affected
linux
- linux_kernel
CWE