Skip to main content

CVE-2024-35810: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-35810cvecve-2024-35810
Published: Fri May 17 2024 (05/17/2024, 13:23:16 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix the lifetime of the bo cursor memory The cleanup can be dispatched while the atomic update is still active, which means that the memory acquired in the atomic update needs to not be invalidated by the cleanup. The buffer objects in vmw_plane_state instead of using the builtin map_and_cache were trying to handle the lifetime of the mapped memory themselves, leading to crashes. Use the map_and_cache instead of trying to manage the lifetime of the buffer objects held by the vmw_plane_state. Fixes kernel oops'es in IGT's kms_cursor_legacy forked-bo.

AI-Powered Analysis

AILast updated: 06/29/2025, 16:10:37 UTC

Technical Analysis

CVE-2024-35810 is a vulnerability identified in the Linux kernel, specifically within the drm/vmwgfx driver component responsible for managing graphics memory related to VMware's virtual GPU. The issue arises from improper handling of the lifetime of buffer objects (bo) used for cursor memory in the vmw_plane_state structure. The vulnerability occurs because the cleanup process for these buffer objects can be dispatched while an atomic update is still active. During this atomic update, memory is acquired and expected to remain valid until the update completes. However, the existing implementation attempted to manage the lifetime of the mapped memory manually instead of relying on the kernel's built-in map_and_cache mechanism. This mismanagement leads to premature invalidation of memory, causing kernel crashes (kernel oops) during operations such as those performed by the IGT's kms_cursor_legacy forked-bo test. The fix involves switching to the use of map_and_cache to correctly manage the lifetime of the buffer objects, preventing invalid memory access and stabilizing the kernel's graphics memory handling. This vulnerability is a memory management flaw that can cause system instability and crashes but does not appear to allow direct code execution or privilege escalation. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the primary impact of CVE-2024-35810 is potential system instability and denial of service (DoS) due to kernel crashes when using affected Linux kernel versions with the vmwgfx driver. This can disrupt operations on virtualized environments or systems using VMware virtual GPUs, which are common in enterprise data centers and cloud infrastructures. Organizations relying on Linux-based virtual machines for critical workloads may experience unexpected downtime or degraded performance. While this vulnerability does not currently indicate a direct security breach such as data leakage or privilege escalation, the resulting crashes could be exploited indirectly to cause service interruptions. For sectors with high availability requirements, such as finance, healthcare, and critical infrastructure, such disruptions could have significant operational and financial consequences. Additionally, the lack of known exploits suggests that immediate risk is moderate, but unpatched systems remain vulnerable to stability issues.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2024-35810. Specifically, they should ensure that the drm/vmwgfx driver uses the map_and_cache method for buffer object lifetime management. System administrators should audit their environments to identify systems running affected kernel versions, particularly those utilizing VMware virtual GPU drivers. Testing kernel updates in staging environments before deployment is recommended to avoid unexpected regressions. Additionally, organizations should monitor kernel logs for signs of drm/vmwgfx-related crashes or oops messages, which could indicate attempts to exploit or trigger the vulnerability. For environments where immediate patching is not feasible, consider isolating affected systems or limiting workloads that trigger atomic updates involving cursor memory. Maintaining robust backup and recovery procedures will help mitigate the impact of potential system crashes. Finally, stay informed through Linux kernel mailing lists and security advisories for any emerging exploit information or updated patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-05-17T12:19:12.342Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ac4522896dcbe3531

Added to database: 5/21/2025, 9:08:58 AM

Last enriched: 6/29/2025, 4:10:37 PM

Last updated: 8/15/2025, 10:50:27 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats