CVE-2024-46710

Source
https://cve.org/CVERecord?id=CVE-2024-46710
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46710.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-46710
Downstream
Related
Published
2024-09-13T06:33:42.285Z
Modified
2026-03-20T12:37:50.105335Z
Summary
drm/vmwgfx: Prevent unmapping active read buffers
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Prevent unmapping active read buffers

The kms paths keep a persistent map active to read and compare the cursor buffer. These maps can race with each other in simple scenario where: a) buffer "a" mapped for update b) buffer "a" mapped for compare c) do the compare d) unmap "a" for compare e) update the cursor f) unmap "a" for update At step "e" the buffer has been unmapped and the read contents is bogus.

Prevent unmapping of active read buffers by simply keeping a count of how many paths have currently active maps and unmap only when the count reaches 0.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/46xxx/CVE-2024-46710.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
485d98d472d53f9617ffdfba5e677ac29ad4fe20
Fixed
58a3714db4d9dcaeb9fc4905141e17b9f536c0a5
Fixed
0851b1ec650adadcaa23ec96daad95a55bf966f0
Fixed
d5228d158e4c0b1663b3983044913c15c3d0135e
Fixed
aba07b9a0587f50e5d3346eaa19019cf3f86c0ea

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-46710.json"