CVE-2024-50134

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2024
Last modified:
08/11/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA<br /> <br /> Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with<br /> a real VLA to fix a "memcpy: detected field-spanning write error" warning:<br /> <br /> [ 13.319813] memcpy: detected field-spanning write (size 16896) of single field "p-&gt;data" at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 (size 4)<br /> [ 13.319841] WARNING: CPU: 0 PID: 1105 at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 hgsmi_update_pointer_shape+0x192/0x1c0 [vboxvideo]<br /> [ 13.320038] Call Trace:<br /> [ 13.320173] hgsmi_update_pointer_shape [vboxvideo]<br /> [ 13.320184] vbox_cursor_atomic_update [vboxvideo]<br /> <br /> Note as mentioned in the added comment it seems the original length<br /> calculation for the allocated and send hgsmi buffer is 4 bytes too large.<br /> Changing this is not the goal of this patch, so this behavior is kept.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.15.170 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.115 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.59 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.11.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*