drm/vmwgfx: Fix invalid reads in fence signaled events
Correctly set the length of the drm_event to the size of the structure
that's actually used.
The length of the drm_event was set to the parent structure instead of
to the drm_vmw_event_fence which is supposed to be read. drm_read
uses the length parameter to copy the event to the user space thus
resuling in oob reads.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3840-1 | linux security update |
![]() |
DLA-3843-1 | linux-5.10 security update |
![]() |
USN-6949-1 | Linux kernel vulnerabilities |
![]() |
USN-6949-2 | Linux kernel vulnerabilities |
![]() |
USN-6950-1 | Linux kernel vulnerabilities |
![]() |
USN-6950-2 | Linux kernel vulnerabilities |
![]() |
USN-6950-3 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6950-4 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-6951-1 | Linux kernel vulnerabilities |
![]() |
USN-6951-2 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6951-3 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6951-4 | Linux kernel (BlueField) vulnerabilities |
![]() |
USN-6952-1 | Linux kernel vulnerabilities |
![]() |
USN-6953-1 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6955-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6956-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6957-1 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6979-1 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-7019-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 01 Apr 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Linux Linux linux Kernel |
|
CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Linux Linux linux Kernel |
Wed, 04 Dec 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_eus:9.4 |
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 13 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Tue, 05 Nov 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 08 Aug 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat enterprise Linux
|
|
CPEs | cpe:/a:redhat:enterprise_linux:8::nfv cpe:/o:redhat:enterprise_linux:8 |
|
Vendors & Products |
Redhat enterprise Linux
|
Wed, 07 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:rhel_eus:9.2 |
Wed, 07 Aug 2024 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhel Eus |
|
CPEs | cpe:/a:redhat:rhel_eus:9.2::nfv | |
Vendors & Products |
Redhat
Redhat rhel Eus |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T09:12:52.237Z
Reserved: 2024-05-30T15:25:07.081Z
Link: CVE-2024-36960

Updated: 2024-08-02T03:43:50.585Z

Status : Analyzed
Published: 2024-06-03T08:15:09.557
Modified: 2025-04-01T18:36:15.960
Link: CVE-2024-36960


No data.