CVE-2024-39497

In the Linux kernel, the following vulnerability has been resolved: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) Lack of check for copy-on-write (COW) mapping in drm_gem_shmem_mmap allows users to call mmap with PROT_WRITE and MAP_PRIVATE flag causing a kernel panic due to BUG_ON in vmf_insert_pfn_prot: BUG_ON((vma->vm_flags & VM_PFNMAP) && is_cow_mapping(vma->vm_flags)); Return -EINVAL early if COW mapping is detected. This bug affects all drm drivers using default shmem helpers. It can be reproduced by this simple example: void *ptr = mmap(0, size, PROT_WRITE, MAP_PRIVATE, fd, mmap_offset); ptr[0] = 0;
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*

History

17 Sep 2025, 16:15

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03c71c42809ef4b17f5d874cdb2d3bf40e847b86 - () https://git.kernel.org/stable/c/03c71c42809ef4b17f5d874cdb2d3bf40e847b86 - Patch
References () https://git.kernel.org/stable/c/1b4a8b89bf6787090b56424d269bf84ba00c3263 - () https://git.kernel.org/stable/c/1b4a8b89bf6787090b56424d269bf84ba00c3263 - Patch
References () https://git.kernel.org/stable/c/2219e5f97244b79c276751a1167615b9714db1b0 - () https://git.kernel.org/stable/c/2219e5f97244b79c276751a1167615b9714db1b0 - Patch
References () https://git.kernel.org/stable/c/39bc27bd688066a63e56f7f64ad34fae03fbe3b8 - () https://git.kernel.org/stable/c/39bc27bd688066a63e56f7f64ad34fae03fbe3b8 - Patch
References () https://git.kernel.org/stable/c/3ae63a8c1685e16958560ec08d30defdc5b9cca0 - () https://git.kernel.org/stable/c/3ae63a8c1685e16958560ec08d30defdc5b9cca0 - Patch
References () https://git.kernel.org/stable/c/a508a102edf8735adc9bb73d37dd13c38d1a1b10 - () https://git.kernel.org/stable/c/a508a102edf8735adc9bb73d37dd13c38d1a1b10 - Patch
First Time Linux
Linux linux Kernel
CWE CWE-617
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03c71c42809ef4b17f5d874cdb2d3bf40e847b86 - () https://git.kernel.org/stable/c/03c71c42809ef4b17f5d874cdb2d3bf40e847b86 -
References () https://git.kernel.org/stable/c/1b4a8b89bf6787090b56424d269bf84ba00c3263 - () https://git.kernel.org/stable/c/1b4a8b89bf6787090b56424d269bf84ba00c3263 -
References () https://git.kernel.org/stable/c/39bc27bd688066a63e56f7f64ad34fae03fbe3b8 - () https://git.kernel.org/stable/c/39bc27bd688066a63e56f7f64ad34fae03fbe3b8 -

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/a508a102edf8735adc9bb73d37dd13c38d1a1b10 -

22 Oct 2024, 15:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: drm/shmem-helper: corrige BUG_ON() en mmap(PROT_WRITE, MAP_PRIVATE) La falta de verificación para el mapeo de copia en escritura (COW) en drm_gem_shmem_mmap permite a los usuarios llamar a mmap con Los indicadores PROT_WRITE y MAP_PRIVATE causan un pánico en el kernel debido a BUG_ON en vmf_insert_pfn_prot: BUG_ON((vma->vm_flags & VM_PFNMAP) && is_cow_mapping(vma->vm_flags)); Devuelva -EINVAL temprano si se detecta el mapeo COW. Este error afecta a todos los controladores drm que utilizan ayudantes shmem predeterminados. Se puede reproducir con este sencillo ejemplo: void *ptr = mmap(0, size, PROT_WRITE, MAP_PRIVATE, fd, mmap_offset); ptr[0] = 0;
References
  • () https://git.kernel.org/stable/c/2219e5f97244b79c276751a1167615b9714db1b0 -
  • () https://git.kernel.org/stable/c/3ae63a8c1685e16958560ec08d30defdc5b9cca0 -

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 16:15


NVD link : CVE-2024-39497

Mitre link : CVE-2024-39497

CVE.ORG link : CVE-2024-39497


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-617

Reachable Assertion