CVE-2024-39497
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)<br />
<br />
Lack of check for copy-on-write (COW) mapping in drm_gem_shmem_mmap<br />
allows users to call mmap with PROT_WRITE and MAP_PRIVATE flag<br />
causing a kernel panic due to BUG_ON in vmf_insert_pfn_prot:<br />
BUG_ON((vma->vm_flags & VM_PFNMAP) && is_cow_mapping(vma->vm_flags));<br />
<br />
Return -EINVAL early if COW mapping is detected.<br />
<br />
This bug affects all drm drivers using default shmem helpers.<br />
It can be reproduced by this simple example:<br />
void *ptr = mmap(0, size, PROT_WRITE, MAP_PRIVATE, fd, mmap_offset);<br />
ptr[0] = 0;
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.2 (including) | 5.10.229 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.169 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.114 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/03c71c42809ef4b17f5d874cdb2d3bf40e847b86
- https://git.kernel.org/stable/c/1b4a8b89bf6787090b56424d269bf84ba00c3263
- https://git.kernel.org/stable/c/2219e5f97244b79c276751a1167615b9714db1b0
- https://git.kernel.org/stable/c/39bc27bd688066a63e56f7f64ad34fae03fbe3b8
- https://git.kernel.org/stable/c/3ae63a8c1685e16958560ec08d30defdc5b9cca0
- https://git.kernel.org/stable/c/a508a102edf8735adc9bb73d37dd13c38d1a1b10
- https://git.kernel.org/stable/c/03c71c42809ef4b17f5d874cdb2d3bf40e847b86
- https://git.kernel.org/stable/c/1b4a8b89bf6787090b56424d269bf84ba00c3263
- https://git.kernel.org/stable/c/39bc27bd688066a63e56f7f64ad34fae03fbe3b8
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



