From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: Fixes the prime operation when using external buffers. Ensures that mapping of external buffers is done via the dma_buf interface, rather than attempting direct access to readable/writable pages. 2. Reason for Fix: - External buffers may not provide direct access to readable/writable pages; therefore, it is necessary to ensure that BOs created from external dma_bufs can be read using the dma_buf interface. - Fixes a conflict between IGT's kms_prime and vgem. This issue does not affect regular desktop usage in virtual machines, as VMs typically do not have multiple GPUs, but the fix improves test coverage for IGT. 3. Code Fix: - Fixes were applied to the files , , and . - The function was modified to ensure external buffer mapping uses the dma_buf interface. - The function was modified to ensure external buffer mapping uses the dma_buf interface. 4. Scope of Fix: - Code fixes were implemented in , , and . - The function was updated to ensure external buffer mapping uses the dma_buf interface. 5. Fix Author: - The fix was authored by Zack Rusin, with email address zack.rusin@broadcom.com. 6. Fix Date: - The fix was committed on August 16, 2024. 7. Fix Status: - The fix has been merged into upstream. 8. Fix Details: - Corrects the prime operation when using external buffers by ensuring mapping is done via the dma_buf interface, avoiding direct access to readable/writable pages. - Resolves the conflict between IGT's kms_prime and vgem, ensuring that regular desktop usage in virtual machines will not trigger this issue. This information helps understand the fix process, scope, author, and date of the vulnerability.