跳转到帖子

Debian: CVE-2024-46710: linux, linux-6.1 -- security update

recommended_posts

发布于
  • Members

Debian: CVE-2024-46710: linux, linux-6.1 -- security update

Severity
4
CVSS
(AV:L/AC:M/Au:S/C:N/I:N/A:C)
Published
09/13/2024
Created
11/12/2024
Added
11/11/2024
Modified
01/30/2025

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Prevent unmapping active read buffers The kms paths keep a persistent map active to read and compare the cursor buffer. These maps can race with each other in simple scenario where: a) buffer "a" mapped for update b) buffer "a" mapped for compare c) do the compare d) unmap "a" for compare e) update the cursor f) unmap "a" for update At step "e" the buffer has been unmapped and the read contents is bogus. Prevent unmapping of active read buffers by simply keeping a count of how many paths have currently active maps and unmap only when the count reaches 0.

Solution(s)

  • debian-upgrade-linux
  • debian-upgrade-linux-6-1

References

  • https://attackerkb.com/topics/cve-2024-46710
  • CVE - 2024-46710
  • DLA-4008-1
  • 查看数 693
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…