In the Linux kernel, the following vulnerability has been resolved:
drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap
drm_gem_ttm_mmap() drops a reference to the gem object on success. If
the gem object's refcount == 1 on entry to drm_gem_prime_mmap(), that
drop will free the gem object, and the subsequent drm_gem_object_get()
will be a UAF. Fix by grabbing a reference before calling the mmap
helper.
This issue was forseen when the reference dropping was adding in
commit 9786b65bc61ac ("drm/ttm: fix mmap refcounting"):
"For that to work properly the drm_gem_object_get() call in
drm_gem_ttm_mmap() must be moved so it happens before calling
obj->funcs->mmap(), otherwise the gem refcount would go down
to zero."
References
Configurations
History
07 Jan 2025, 17:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/4f8e469a2384dfa4047145b0093126462cbb6dc0 - Patch | |
References | () https://git.kernel.org/stable/c/8244a3bc27b3efd057da154b8d7e414670d5044f - Patch | |
CWE | CWE-416 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 06:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/4f8e469a2384dfa4047145b0093126462cbb6dc0 - | |
References | () https://git.kernel.org/stable/c/8244a3bc27b3efd057da154b8d7e414670d5044f - | |
Summary |
|
10 Apr 2024, 19:49
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 19:15
Updated : 2025-01-07 17:12
NVD link : CVE-2021-47200
Mitre link : CVE-2021-47200
CVE.ORG link : CVE-2021-47200
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free