{"uuid": "7fb037f0-2d7a-494a-92a4-bf5a0e623f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46710", "type": "seen", "source": "https://t.me/cvedetector/5570", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46710 - VMware vMWGFX Unmapped Active Read Buffer Race Condition\", \n  \"Content\": \"CVE ID : CVE-2024-46710 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/vmwgfx: Prevent unmapping active read buffers  \n  \nThe kms paths keep a persistent map active to read and compare the cursor  \nbuffer. These maps can race with each other in simple scenario where:  \na) buffer \"a\" mapped for update  \nb) buffer \"a\" mapped for compare  \nc) do the compare  \nd) unmap \"a\" for compare  \ne) update the cursor  \nf) unmap \"a\" for update  \nAt step \"e\" the buffer has been unmapped and the read contents is bogus.  \n  \nPrevent unmapping of active read buffers by simply keeping a count of  \nhow many paths have currently active maps and unmap only when the count  \nreaches 0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:36:13.000000Z"}