[SRU][N][PATCH 0/1] CVE-2024-50134
Massimiliano Pellizzer
massimiliano.pellizzer at canonical.com
Wed Jan 22 17:54:36 UTC 2025
[Impact]
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with
a real VLA to fix a "memcpy: detected field-spanning write error"
warning.
[Fix]
Oracular: Fixed via upstream stable updates (41e06fb6d27c95)
Noble: Clean cherry pick from mainline
Jammy: Fixed via upstream stable updates (affd4cd3dd5ef9)
Focal: Fixed via upstream stable updates (417968cbb4a65d)
Bionic: Sent to ESM ML
Xenial: Sent to ESM ML
Trusty: Sent to ESM ML
[Test Case]
Compile tested only.
[Where problems could occur]
The fix affects the vboxvideo driver in the DRM subsystem. An issue with
this fix may lead to improper memory handling, possibly causing
instability in screen rendering or crashing in VirtualBox guest systems.
This could result in degraded graphical performance or an inability to
adjust dispaly resolution dynamically.
Hans de Goede (1):
drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape
with real VLA
drivers/gpu/drm/vboxvideo/hgsmi_base.c | 10 +++++++++-
drivers/gpu/drm/vboxvideo/vboxvideo.h | 4 +---
2 files changed, 10 insertions(+), 4 deletions(-)
--
2.43.0
More information about the kernel-team
mailing list