We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50174

drm/panthor: Fix race when converting group handle to group object



Description

In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix race when converting group handle to group object XArray provides it's own internal lock which protects the internal array when entries are being simultaneously added and removed. However there is still a race between retrieving the pointer from the XArray and incrementing the reference count. To avoid this race simply hold the internal XArray lock when incrementing the reference count, this ensures there cannot be a racing call to xa_erase().

Reserved 2024-10-21 | Published 2024-11-08 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

de8548813824 before 8a585d553c11
affected

de8548813824 before 44742138d151
affected

de8548813824 before cac075706f29
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.10.14
unaffected

6.11.3
unaffected

6.12
unaffected

References

git.kernel.org/...c/8a585d553c11965332d7a2d74e79ef92a42bfc87

git.kernel.org/...c/44742138d151c3a945460ae7beff8ae45ac0bf58

git.kernel.org/...c/cac075706f298948898b1f63e81709df42afa75d

cve.org (CVE-2024-50174)

nvd.nist.gov (CVE-2024-50174)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50174

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.