{"id":"CVE-2024-35950","summary":"drm/client: Fully protect modes[] with dev-\u003emode_config.mutex","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fully protect modes[] with dev-\u003emode_config.mutex\n\nThe modes[] array contains pointers to modes on the connectors'\nmode lists, which are protected by dev-\u003emode_config.mutex.\nThus we need to extend modes[] the same protection or by the\ntime we use it the elements may already be pointing to\nfreed/reused memory.","modified":"2026-04-02T11:53:20.328076Z","published":"2024-05-20T09:41:45.333Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2135-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2203-1","SUSE-SU-2024:2360-1","SUSE-SU-2024:2362-1","SUSE-SU-2024:2365-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2384-1","SUSE-SU-2024:2385-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2495-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2719-1","SUSE-SU-2024:2722-1","SUSE-SU-2024:2724-1","SUSE-SU-2024:2725-1","SUSE-SU-2024:2734-1","SUSE-SU-2024:2740-1","SUSE-SU-2024:2750-1","SUSE-SU-2024:2751-1","SUSE-SU-2024:2755-1","SUSE-SU-2024:2758-1","SUSE-SU-2024:2759-1","SUSE-SU-2024:2760-1","SUSE-SU-2024:2771-1","SUSE-SU-2024:2773-1","SUSE-SU-2024:2792-1","SUSE-SU-2024:2793-1","SUSE-SU-2024:2797-1","SUSE-SU-2024:2815-1","SUSE-SU-2024:2818-1","SUSE-SU-2024:2821-1","SUSE-SU-2024:2822-1","SUSE-SU-2024:2823-1","SUSE-SU-2024:2824-1","SUSE-SU-2024:2825-1","SUSE-SU-2024:2827-1","SUSE-SU-2024:2840-1","SUSE-SU-2024:2841-1","SUSE-SU-2024:2843-1","SUSE-SU-2024:2850-1","SUSE-SU-2024:2851-1","SUSE-SU-2024:2874-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2973-1","SUSE-SU-2024:3015-1","SUSE-SU-2024:3034-1","SUSE-SU-2024:3037-1","SUSE-SU-2024:3039-1","SUSE-SU-2024:3043-1","SUSE-SU-2024:3044-1","SUSE-SU-2024:3048-1","SUSE-SU-2024:3318-1","SUSE-SU-2024:3336-1","SUSE-SU-2024:3347-1","SUSE-SU-2024:3348-1","SUSE-SU-2024:3363-1","SUSE-SU-2024:3365-1","SUSE-SU-2024:3368-1","SUSE-SU-2024:3370-1","SUSE-SU-2024:3375-1","SUSE-SU-2024:3379-1","SUSE-SU-2024:3399-1","SUSE-SU-2024:3623-1","SUSE-SU-2024:3631-1","SUSE-SU-2024:3639-1","SUSE-SU-2024:3642-1","SUSE-SU-2024:3649-1","SUSE-SU-2024:3651-1","SUSE-SU-2024:3652-1","SUSE-SU-2024:3661-1","SUSE-SU-2024:3662-1","SUSE-SU-2024:3663-1","SUSE-SU-2024:3672-1","SUSE-SU-2024:3674-1","SUSE-SU-2024:3676-1","SUSE-SU-2024:3679-1","SUSE-SU-2024:3685-1","SUSE-SU-2024:3694-1","SUSE-SU-2024:3695-1","SUSE-SU-2024:3696-1","SUSE-SU-2024:3697-1","SUSE-SU-2024:3700-1","SUSE-SU-2024:3774-1","SUSE-SU-2024:3780-1","SUSE-SU-2024:3793-1","SUSE-SU-2024:3796-1","SUSE-SU-2024:3798-1","SUSE-SU-2024:3800-1","SUSE-SU-2024:3803-1","SUSE-SU-2024:3806-1","SUSE-SU-2024:3814-1","SUSE-SU-2024:3815-1","SUSE-SU-2024:3820-1","SUSE-SU-2024:3821-1","SUSE-SU-2024:3822-1","SUSE-SU-2024:3829-1","SUSE-SU-2024:3830-1","SUSE-SU-2024:3837-1","SUSE-SU-2024:3842-1","SUSE-SU-2024:3849-1","SUSE-SU-2024:3851-1","SUSE-SU-2024:3852-1","SUSE-SU-2024:3854-1","SUSE-SU-2024:3855-1","SUSE-SU-2024:4122-1","SUSE-SU-2024:4123-1","SUSE-SU-2024:4124-1","SUSE-SU-2024:4180-1","SUSE-SU-2024:4197-1","SUSE-SU-2024:4214-1","SUSE-SU-2024:4216-1","SUSE-SU-2024:4218-1","SUSE-SU-2024:4226-1","SUSE-SU-2024:4231-1","SUSE-SU-2024:4234-1","SUSE-SU-2024:4235-1","SUSE-SU-2024:4236-1","SUSE-SU-2024:4242-1","SUSE-SU-2024:4246-1","SUSE-SU-2024:4249-1","SUSE-SU-2024:4250-1","SUSE-SU-2024:4256-1","SUSE-SU-2024:4263-1","SUSE-SU-2024:4264-1","SUSE-SU-2024:4266-1","SUSE-SU-2024:4275-1","SUSE-SU-2025:0091-1","SUSE-SU-2025:0097-1","SUSE-SU-2025:0101-1","SUSE-SU-2025:0103-1","SUSE-SU-2025:0106-1","SUSE-SU-2025:0107-1","SUSE-SU-2025:0109-1","SUSE-SU-2025:0110-1","SUSE-SU-2025:0114-1","SUSE-SU-2025:0115-1","SUSE-SU-2025:0124-1","SUSE-SU-2025:0131-1","SUSE-SU-2025:0137-1","SUSE-SU-2025:0150-1","SUSE-SU-2025:0158-1","SUSE-SU-2025:0238-1","SUSE-SU-2025:0239-1","SUSE-SU-2025:0240-1","SUSE-SU-2025:0244-1","SUSE-SU-2025:0248-1","SUSE-SU-2025:0249-1","SUSE-SU-2025:0251-1","SUSE-SU-2025:0252-1","SUSE-SU-2025:0253-1","SUSE-SU-2025:0261-1","SUSE-SU-2025:0264-1","SUSE-SU-2025:0266-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1","SUSE-SU-2025:20166-1","SUSE-SU-2025:20249-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35950.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/04e018bd913d3d3336ab7d21c2ad31a9175fe984"},{"type":"WEB","url":"https://git.kernel.org/stable/c/18c8cc6680ce938d0458859b6a08b4d34f7d8055"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3eadd887dbac1df8f25f701e5d404d1b90fd0fea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/41586487769eede64ab1aa6c65c74cbf76c12ef0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5a2f957e3c4553bbb100504a1acfeaeb33f4ca4e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ceb873d816786a7c8058f50d903574aff8d3764"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d2dc6600d4e3e1453e3b1fb233e9f97e2a1ae949"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/35xxx/CVE-2024-35950.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-35950"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e13a058310509b22b2b45cbdd82d8797e173c3db"},{"fixed":"5a2f957e3c4553bbb100504a1acfeaeb33f4ca4e"},{"fixed":"41586487769eede64ab1aa6c65c74cbf76c12ef0"},{"fixed":"d2dc6600d4e3e1453e3b1fb233e9f97e2a1ae949"},{"fixed":"18c8cc6680ce938d0458859b6a08b4d34f7d8055"},{"fixed":"04e018bd913d3d3336ab7d21c2ad31a9175fe984"},{"fixed":"8ceb873d816786a7c8058f50d903574aff8d3764"},{"fixed":"3eadd887dbac1df8f25f701e5d404d1b90fd0fea"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35950.json"}}],"schema_version":"1.7.5"}