CVE-2024-35950

Source
https://cve.org/CVERecord?id=CVE-2024-35950
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35950.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35950
Downstream
Related
Published
2024-05-20T09:41:45.333Z
Modified
2026-03-14T12:34:05.848744Z
Summary
drm/client: Fully protect modes[] with dev->mode_config.mutex
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fully protect modes[] with dev->mode_config.mutex

The modes[] array contains pointers to modes on the connectors' mode lists, which are protected by dev->mode_config.mutex. Thus we need to extend modes[] the same protection or by the time we use it the elements may already be pointing to freed/reused memory.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35950.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e13a058310509b22b2b45cbdd82d8797e173c3db
Fixed
5a2f957e3c4553bbb100504a1acfeaeb33f4ca4e
Fixed
41586487769eede64ab1aa6c65c74cbf76c12ef0
Fixed
d2dc6600d4e3e1453e3b1fb233e9f97e2a1ae949
Fixed
18c8cc6680ce938d0458859b6a08b4d34f7d8055
Fixed
04e018bd913d3d3336ab7d21c2ad31a9175fe984
Fixed
8ceb873d816786a7c8058f50d903574aff8d3764
Fixed
3eadd887dbac1df8f25f701e5d404d1b90fd0fea

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35950.json"