CVE-2024-35810: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory The cleanup can be dispatched while the atomic update is still active, which means that the memory acquired in the atomic update needs to not be invalidated by the cleanup. The buffer objects in vmw_plane_state instead of using the builtin map_and_cache were trying to handle the lifetime of the mapped memory themselves, leading to crashes. Use the map_and_cache instead of trying to manage the lifetime of the buffer objects held by the vmw_plane_state. Fixes kernel oops'es in IGT's kms_cursor_legacy forked-bo.
AI Analysis
Technical Summary
CVE-2024-35810 is a vulnerability identified in the Linux kernel, specifically within the drm/vmwgfx driver component responsible for managing graphics memory related to VMware's virtual GPU. The issue arises from improper handling of the lifetime of buffer objects (bo) used for cursor memory in the vmw_plane_state structure. The vulnerability occurs because the cleanup process for these buffer objects can be dispatched while an atomic update is still active. During this atomic update, memory is acquired and expected to remain valid until the update completes. However, the existing implementation attempted to manage the lifetime of the mapped memory manually instead of relying on the kernel's built-in map_and_cache mechanism. This mismanagement leads to premature invalidation of memory, causing kernel crashes (kernel oops) during operations such as those performed by the IGT's kms_cursor_legacy forked-bo test. The fix involves switching to the use of map_and_cache to correctly manage the lifetime of the buffer objects, preventing invalid memory access and stabilizing the kernel's graphics memory handling. This vulnerability is a memory management flaw that can cause system instability and crashes but does not appear to allow direct code execution or privilege escalation. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-35810 is potential system instability and denial of service (DoS) due to kernel crashes when using affected Linux kernel versions with the vmwgfx driver. This can disrupt operations on virtualized environments or systems using VMware virtual GPUs, which are common in enterprise data centers and cloud infrastructures. Organizations relying on Linux-based virtual machines for critical workloads may experience unexpected downtime or degraded performance. While this vulnerability does not currently indicate a direct security breach such as data leakage or privilege escalation, the resulting crashes could be exploited indirectly to cause service interruptions. For sectors with high availability requirements, such as finance, healthcare, and critical infrastructure, such disruptions could have significant operational and financial consequences. Additionally, the lack of known exploits suggests that immediate risk is moderate, but unpatched systems remain vulnerable to stability issues.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2024-35810. Specifically, they should ensure that the drm/vmwgfx driver uses the map_and_cache method for buffer object lifetime management. System administrators should audit their environments to identify systems running affected kernel versions, particularly those utilizing VMware virtual GPU drivers. Testing kernel updates in staging environments before deployment is recommended to avoid unexpected regressions. Additionally, organizations should monitor kernel logs for signs of drm/vmwgfx-related crashes or oops messages, which could indicate attempts to exploit or trigger the vulnerability. For environments where immediate patching is not feasible, consider isolating affected systems or limiting workloads that trigger atomic updates involving cursor memory. Maintaining robust backup and recovery procedures will help mitigate the impact of potential system crashes. Finally, stay informed through Linux kernel mailing lists and security advisories for any emerging exploit information or updated patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2024-35810: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory The cleanup can be dispatched while the atomic update is still active, which means that the memory acquired in the atomic update needs to not be invalidated by the cleanup. The buffer objects in vmw_plane_state instead of using the builtin map_and_cache were trying to handle the lifetime of the mapped memory themselves, leading to crashes. Use the map_and_cache instead of trying to manage the lifetime of the buffer objects held by the vmw_plane_state. Fixes kernel oops'es in IGT's kms_cursor_legacy forked-bo.
AI-Powered Analysis
Technical Analysis
CVE-2024-35810 is a vulnerability identified in the Linux kernel, specifically within the drm/vmwgfx driver component responsible for managing graphics memory related to VMware's virtual GPU. The issue arises from improper handling of the lifetime of buffer objects (bo) used for cursor memory in the vmw_plane_state structure. The vulnerability occurs because the cleanup process for these buffer objects can be dispatched while an atomic update is still active. During this atomic update, memory is acquired and expected to remain valid until the update completes. However, the existing implementation attempted to manage the lifetime of the mapped memory manually instead of relying on the kernel's built-in map_and_cache mechanism. This mismanagement leads to premature invalidation of memory, causing kernel crashes (kernel oops) during operations such as those performed by the IGT's kms_cursor_legacy forked-bo test. The fix involves switching to the use of map_and_cache to correctly manage the lifetime of the buffer objects, preventing invalid memory access and stabilizing the kernel's graphics memory handling. This vulnerability is a memory management flaw that can cause system instability and crashes but does not appear to allow direct code execution or privilege escalation. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the primary impact of CVE-2024-35810 is potential system instability and denial of service (DoS) due to kernel crashes when using affected Linux kernel versions with the vmwgfx driver. This can disrupt operations on virtualized environments or systems using VMware virtual GPUs, which are common in enterprise data centers and cloud infrastructures. Organizations relying on Linux-based virtual machines for critical workloads may experience unexpected downtime or degraded performance. While this vulnerability does not currently indicate a direct security breach such as data leakage or privilege escalation, the resulting crashes could be exploited indirectly to cause service interruptions. For sectors with high availability requirements, such as finance, healthcare, and critical infrastructure, such disruptions could have significant operational and financial consequences. Additionally, the lack of known exploits suggests that immediate risk is moderate, but unpatched systems remain vulnerable to stability issues.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2024-35810. Specifically, they should ensure that the drm/vmwgfx driver uses the map_and_cache method for buffer object lifetime management. System administrators should audit their environments to identify systems running affected kernel versions, particularly those utilizing VMware virtual GPU drivers. Testing kernel updates in staging environments before deployment is recommended to avoid unexpected regressions. Additionally, organizations should monitor kernel logs for signs of drm/vmwgfx-related crashes or oops messages, which could indicate attempts to exploit or trigger the vulnerability. For environments where immediate patching is not feasible, consider isolating affected systems or limiting workloads that trigger atomic updates involving cursor memory. Maintaining robust backup and recovery procedures will help mitigate the impact of potential system crashes. Finally, stay informed through Linux kernel mailing lists and security advisories for any emerging exploit information or updated patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T12:19:12.342Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe3531
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 4:10:37 PM
Last updated: 8/15/2025, 10:50:27 AM
Views: 16
Related Threats
CVE-2025-52287: n/a
UnknownCVE-2025-55581: n/a
HighCVE-2025-52085: n/a
HighCVE-2025-43760: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-55613: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.