ACK: [SRU][N][PATCH 0/1] CVE-2024-50134
Koichiro Den
koichiro.den at canonical.com
Fri Jan 31 01:38:58 UTC 2025
On Wed, Jan 22, 2025 at 06:54:36PM GMT, Massimiliano Pellizzer wrote:
> [Impact]
>
> drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
>
> Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with
> a real VLA to fix a "memcpy: detected field-spanning write error"
> warning.
>
> [Fix]
>
> Oracular: Fixed via upstream stable updates (41e06fb6d27c95)
> Noble: Clean cherry pick from mainline
> Jammy: Fixed via upstream stable updates (affd4cd3dd5ef9)
> Focal: Fixed via upstream stable updates (417968cbb4a65d)
> Bionic: Sent to ESM ML
> Xenial: Sent to ESM ML
> Trusty: Sent to ESM ML
>
> [Test Case]
>
> Compile tested only.
>
> [Where problems could occur]
>
> The fix affects the vboxvideo driver in the DRM subsystem. An issue with
> this fix may lead to improper memory handling, possibly causing
> instability in screen rendering or crashing in VirtualBox guest systems.
> This could result in degraded graphical performance or an inability to
> adjust dispaly resolution dynamically.
>
> Hans de Goede (1):
> drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape
> with real VLA
>
> drivers/gpu/drm/vboxvideo/hgsmi_base.c | 10 +++++++++-
> drivers/gpu/drm/vboxvideo/vboxvideo.h | 4 +---
> 2 files changed, 10 insertions(+), 4 deletions(-)
>
Acked-by: Koichiro Den <koichiro.den at canonical.com>
More information about the kernel-team
mailing list