CVE-2024-35810

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory The cleanup can be dispatched while the atomic update is still active, which means that the memory acquired in the atomic update needs to not be invalidated by the cleanup. The buffer objects in vmw_plane_state instead of using the builtin map_and_cache were trying to handle the lifetime of the mapped memory themselves, leading to crashes. Use the map_and_cache instead of trying to manage the lifetime of the buffer objects held by the vmw_plane_state. Fixes kernel oops'es in IGT's kms_cursor_legacy forked-bo.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

26 Sep 2025, 15:56

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c - () https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c - Patch
References () https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d - () https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d - Patch
References () https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76 - () https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76 - Patch
References () https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae - () https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae - Patch
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:20

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/vmwgfx: corregida la vida útil de la memoria del cursor bo. La sanitización se puede realizar mientras la actualización atómica aún está activa, lo que significa que la memoria adquirida en la actualización atómica no necesita ser invalidado por la limpieza. Los objetos del búfer en vmw_plane_state, en lugar de utilizar el map_and_cache incorporado, intentaban manejar ellos mismos la vida útil de la memoria asignada, lo que provocaba fallos. Utilice map_and_cache en lugar de intentar administrar la vida útil de los objetos del búfer retenidos por vmw_plane_state. Corrige los errores del kernel en kms_cursor_legacy forked-bo de IGT.
References () https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c - () https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c -
References () https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d - () https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d -
References () https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76 - () https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76 -
References () https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae - () https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae -

17 May 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-17 14:15

Updated : 2025-09-26 15:56


NVD link : CVE-2024-35810

Mitre link : CVE-2024-35810

CVE.ORG link : CVE-2024-35810


JSON object : View

Products Affected

linux

  • linux_kernel