First published: Fri Sep 13 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix prime with external buffers Make sure that for external buffers mapping goes through the dma_buf interface instead of trying to access pages directly. External buffers might not provide direct access to readable/writable pages so to make sure the bo's created from external dma_bufs can be read dma_buf interface has to be used. Fixes crashes in IGT's kms_prime with vgem. Regular desktop usage won't trigger this due to the fact that virtual machines will not have multiple GPUs but it enables better test coverage in IGT.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.9-1 6.12.10-1 | |
Linux Kernel | >=6.6.29<6.6.49 | |
Linux Kernel | >=6.8.8<6.9 | |
Linux Kernel | >=6.9<6.10.8 | |
Linux Kernel | =6.11-rc1 | |
Linux Kernel | =6.11-rc2 | |
Linux Kernel | =6.11-rc3 | |
Linux Kernel | =6.11-rc4 | |
Linux Kernel | =6.11-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46709 has been classified with a severity rating of medium due to potential exploitation of external buffer mapping.
To fix CVE-2024-46709, update your Linux kernel to the patched versions 5.10.223-1, 5.10.226-1, 6.1.123-1, 6.1.119-1, 6.12.9-1, or 6.12.10-1.
CVE-2024-46709 affects various versions of the Linux kernel including versions between 6.11-rc1 to 6.11-rc5 and several others within specified version ranges.
The impact of CVE-2024-46709 could potentially allow attackers to exploit vulnerabilities related to external buffer mappings.
Currently, the recommended action is to apply the available security updates as there are no effective workarounds for CVE-2024-46709.