ACK: [SRU][N][PATCH 0/1] CVE-2024-50134

Koichiro Den koichiro.den at canonical.com
Fri Jan 31 01:38:58 UTC 2025


On Wed, Jan 22, 2025 at 06:54:36PM GMT, Massimiliano Pellizzer wrote:
> [Impact]
> 
> drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA
> 
> Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with
> a real VLA to fix a "memcpy: detected field-spanning write error"
> warning.
> 
> [Fix]
> 
> Oracular: Fixed via upstream stable updates (41e06fb6d27c95)
> Noble: Clean cherry pick from mainline
> Jammy: Fixed via upstream stable updates (affd4cd3dd5ef9)
> Focal: Fixed via upstream stable updates (417968cbb4a65d)
> Bionic: Sent to ESM ML
> Xenial: Sent to ESM ML
> Trusty: Sent to ESM ML
> 
> [Test Case]
> 
> Compile tested only.
> 
> [Where problems could occur]
> 
> The fix affects the vboxvideo driver in the DRM subsystem. An issue with
> this fix may lead to improper memory handling, possibly causing
> instability in screen rendering or crashing in VirtualBox guest systems.
> This could result in degraded graphical performance or an inability to
> adjust dispaly resolution dynamically.
> 
> Hans de Goede (1):
>   drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape
>     with real VLA
> 
>  drivers/gpu/drm/vboxvideo/hgsmi_base.c | 10 +++++++++-
>  drivers/gpu/drm/vboxvideo/vboxvideo.h  |  4 +---
>  2 files changed, 10 insertions(+), 4 deletions(-)
> 

Acked-by: Koichiro Den <koichiro.den at canonical.com>



More information about the kernel-team mailing list