In the Linux kernel, the following vulnerability has been resolved:
drm/client: Fully protect modes[] with dev->mode_config.mutex
The modes[] array contains pointers to modes on the connectors'
mode lists, which are protected by dev->mode_config.mutex.
Thus we need to extend modes[] the same protection or by the
time we use it the elements may already be pointing to
freed/reused memory.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 03:38
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/04e018bd913d3d3336ab7d21c2ad31a9175fe984 - Patch | |
| References | () https://git.kernel.org/stable/c/18c8cc6680ce938d0458859b6a08b4d34f7d8055 - Patch | |
| References | () https://git.kernel.org/stable/c/3eadd887dbac1df8f25f701e5d404d1b90fd0fea - Patch | |
| References | () https://git.kernel.org/stable/c/41586487769eede64ab1aa6c65c74cbf76c12ef0 - Patch | |
| References | () https://git.kernel.org/stable/c/5a2f957e3c4553bbb100504a1acfeaeb33f4ca4e - Patch | |
| References | () https://git.kernel.org/stable/c/8ceb873d816786a7c8058f50d903574aff8d3764 - Patch | |
| References | () https://git.kernel.org/stable/c/d2dc6600d4e3e1453e3b1fb233e9f97e2a1ae949 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory, Mailing List | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* |
21 Nov 2024, 09:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/04e018bd913d3d3336ab7d21c2ad31a9175fe984 - | |
| References | () https://git.kernel.org/stable/c/18c8cc6680ce938d0458859b6a08b4d34f7d8055 - | |
| References | () https://git.kernel.org/stable/c/3eadd887dbac1df8f25f701e5d404d1b90fd0fea - | |
| References | () https://git.kernel.org/stable/c/41586487769eede64ab1aa6c65c74cbf76c12ef0 - | |
| References | () https://git.kernel.org/stable/c/5a2f957e3c4553bbb100504a1acfeaeb33f4ca4e - | |
| References | () https://git.kernel.org/stable/c/8ceb873d816786a7c8058f50d903574aff8d3764 - | |
| References | () https://git.kernel.org/stable/c/d2dc6600d4e3e1453e3b1fb233e9f97e2a1ae949 - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
20 May 2024, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-20 10:15
Updated : 2025-12-17 03:38
NVD link : CVE-2024-35950
Mitre link : CVE-2024-35950
CVE.ORG link : CVE-2024-35950
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
