CVE-2024-46712 (GCVE-0-2024-46712)
Vulnerability from cvelistv5 – Published: 2024-09-13 06:44 – Updated: 2025-05-04 09:32
VLAI?
Summary
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Disable coherent dumb buffers without 3d
Coherent surfaces make only sense if the host renders to them using
accelerated apis. Without 3d the entire content of dumb buffers stays
in the guest making all of the extra work they're doing to synchronize
between guest and host useless.
Configurations without 3d also tend to run with very low graphics
memory limits. The pinned console fb, mob cursors and graphical login
manager tend to run out of 16MB graphics memory that those guests use.
Fix it by making sure the coherent dumb buffers are only used on
configs with 3d enabled.
Severity ?
No CVSS data available.
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-46712",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-29T14:59:14.613769Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-29T14:59:29.584Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/gpu/drm/vmwgfx/vmwgfx_surface.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "c45558414b8f2e0b9dc34eb8f9d4e8359b887681",
"status": "affected",
"version": "af6441e6f3d41e95bfc5bfc11960c259bb4f0f11",
"versionType": "git"
},
{
"lessThan": "e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4",
"status": "affected",
"version": "d6667f0ddf46c671d379cd5fe66ce0a54d2a743a",
"versionType": "git"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/gpu/drm/vmwgfx/vmwgfx_surface.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "6.10.8",
"status": "affected",
"version": "6.10.4",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.8",
"versionStartIncluding": "6.10.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Disable coherent dumb buffers without 3d\n\nCoherent surfaces make only sense if the host renders to them using\naccelerated apis. Without 3d the entire content of dumb buffers stays\nin the guest making all of the extra work they\u0027re doing to synchronize\nbetween guest and host useless.\n\nConfigurations without 3d also tend to run with very low graphics\nmemory limits. The pinned console fb, mob cursors and graphical login\nmanager tend to run out of 16MB graphics memory that those guests use.\n\nFix it by making sure the coherent dumb buffers are only used on\nconfigs with 3d enabled."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T09:32:30.179Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/c45558414b8f2e0b9dc34eb8f9d4e8359b887681"
},
{
"url": "https://git.kernel.org/stable/c/e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4"
}
],
"title": "drm/vmwgfx: Disable coherent dumb buffers without 3d",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-46712",
"datePublished": "2024-09-13T06:44:59.746Z",
"dateReserved": "2024-09-11T15:12:18.254Z",
"dateUpdated": "2025-05-04T09:32:30.179Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.10.4\", \"versionEndExcluding\": \"6.10.8\", \"matchCriteriaId\": \"A9E96A86-D22B-477E-BCB3-D47165518111\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DEB27E7-30AA-45CC-8934-B89263EF3551\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0005AEF-856E-47EB-BFE4-90C46899394D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"39889A68-6D34-47A6-82FC-CD0BF23D6754\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8383ABF-1457-401F-9B61-EE50F4C61F4F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/vmwgfx: Disable coherent dumb buffers without 3d\\n\\nCoherent surfaces make only sense if the host renders to them using\\naccelerated apis. Without 3d the entire content of dumb buffers stays\\nin the guest making all of the extra work they\u0027re doing to synchronize\\nbetween guest and host useless.\\n\\nConfigurations without 3d also tend to run with very low graphics\\nmemory limits. The pinned console fb, mob cursors and graphical login\\nmanager tend to run out of 16MB graphics memory that those guests use.\\n\\nFix it by making sure the coherent dumb buffers are only used on\\nconfigs with 3d enabled.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: Deshabilitar los b\\u00faferes dumb coherentes sin 3d Las superficies coherentes solo tienen sentido si el host las renderiza usando apis aceleradas. Sin 3d, todo el contenido de los b\\u00faferes tontos permanece en el invitado, lo que hace que todo el trabajo adicional que est\\u00e1n haciendo para sincronizar entre el invitado y el host sea in\\u00fatil. Las configuraciones sin 3d tambi\\u00e9n tienden a ejecutarse con l\\u00edmites de memoria gr\\u00e1fica muy bajos. El fb de la consola fija, los cursores mob y el administrador de inicio de sesi\\u00f3n gr\\u00e1fico tienden a quedarse sin la memoria gr\\u00e1fica de 16 MB que usan esos invitados. Arr\\u00e9glelo asegur\\u00e1ndose de que los b\\u00faferes dumb coherentes solo se usen en configuraciones con 3d habilitado.\"}]",
"id": "CVE-2024-46712",
"lastModified": "2024-09-19T13:09:22.957",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2024-09-13T07:15:06.030",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/c45558414b8f2e0b9dc34eb8f9d4e8359b887681\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-46712\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-09-13T07:15:06.030\",\"lastModified\":\"2024-09-19T13:09:22.957\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/vmwgfx: Disable coherent dumb buffers without 3d\\n\\nCoherent surfaces make only sense if the host renders to them using\\naccelerated apis. Without 3d the entire content of dumb buffers stays\\nin the guest making all of the extra work they\u0027re doing to synchronize\\nbetween guest and host useless.\\n\\nConfigurations without 3d also tend to run with very low graphics\\nmemory limits. The pinned console fb, mob cursors and graphical login\\nmanager tend to run out of 16MB graphics memory that those guests use.\\n\\nFix it by making sure the coherent dumb buffers are only used on\\nconfigs with 3d enabled.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/vmwgfx: Deshabilitar los b\u00faferes dumb coherentes sin 3d Las superficies coherentes solo tienen sentido si el host las renderiza usando apis aceleradas. Sin 3d, todo el contenido de los b\u00faferes tontos permanece en el invitado, lo que hace que todo el trabajo adicional que est\u00e1n haciendo para sincronizar entre el invitado y el host sea in\u00fatil. Las configuraciones sin 3d tambi\u00e9n tienden a ejecutarse con l\u00edmites de memoria gr\u00e1fica muy bajos. El fb de la consola fija, los cursores mob y el administrador de inicio de sesi\u00f3n gr\u00e1fico tienden a quedarse sin la memoria gr\u00e1fica de 16 MB que usan esos invitados. Arr\u00e9glelo asegur\u00e1ndose de que los b\u00faferes dumb coherentes solo se usen en configuraciones con 3d habilitado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.10.4\",\"versionEndExcluding\":\"6.10.8\",\"matchCriteriaId\":\"A9E96A86-D22B-477E-BCB3-D47165518111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DEB27E7-30AA-45CC-8934-B89263EF3551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0005AEF-856E-47EB-BFE4-90C46899394D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"39889A68-6D34-47A6-82FC-CD0BF23D6754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8383ABF-1457-401F-9B61-EE50F4C61F4F\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/c45558414b8f2e0b9dc34eb8f9d4e8359b887681\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-46712\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-29T14:59:14.613769Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-29T14:59:18.928Z\"}}], \"cna\": {\"title\": \"drm/vmwgfx: Disable coherent dumb buffers without 3d\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"af6441e6f3d41e95bfc5bfc11960c259bb4f0f11\", \"lessThan\": \"c45558414b8f2e0b9dc34eb8f9d4e8359b887681\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d6667f0ddf46c671d379cd5fe66ce0a54d2a743a\", \"lessThan\": \"e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/gpu/drm/vmwgfx/vmwgfx_surface.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.10.4\", \"lessThan\": \"6.10.8\", \"versionType\": \"semver\"}], \"programFiles\": [\"drivers/gpu/drm/vmwgfx/vmwgfx_surface.c\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/c45558414b8f2e0b9dc34eb8f9d4e8359b887681\"}, {\"url\": \"https://git.kernel.org/stable/c/e9fd436bb8fb9b9d31fdf07bbcdba6d30290c5e4\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/vmwgfx: Disable coherent dumb buffers without 3d\\n\\nCoherent surfaces make only sense if the host renders to them using\\naccelerated apis. Without 3d the entire content of dumb buffers stays\\nin the guest making all of the extra work they\u0027re doing to synchronize\\nbetween guest and host useless.\\n\\nConfigurations without 3d also tend to run with very low graphics\\nmemory limits. The pinned console fb, mob cursors and graphical login\\nmanager tend to run out of 16MB graphics memory that those guests use.\\n\\nFix it by making sure the coherent dumb buffers are only used on\\nconfigs with 3d enabled.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10.8\", \"versionStartIncluding\": \"6.10.4\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:32:30.179Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-46712\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:32:30.179Z\", \"dateReserved\": \"2024-09-11T15:12:18.254Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-09-13T06:44:59.746Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…