We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-53187

io_uring: check for overflows in io_pin_pages



Description

In the Linux kernel, the following vulnerability has been resolved: io_uring: check for overflows in io_pin_pages WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144 CPU: 0 UID: 0 PID: 5834 Comm: syz-executor825 Not tainted 6.12.0-next-20241118-syzkaller #0 Call Trace: <TASK> __io_uaddr_map+0xfb/0x2d0 io_uring/memmap.c:183 io_rings_map io_uring/io_uring.c:2611 [inline] io_allocate_scq_urings+0x1c0/0x650 io_uring/io_uring.c:3470 io_uring_create+0x5b5/0xc00 io_uring/io_uring.c:3692 io_uring_setup io_uring/io_uring.c:3781 [inline] ... </TASK> io_pin_pages()'s uaddr parameter came directly from the user and can be garbage. Don't just add size to it as it can overflow.

Reserved 2024-11-19 | Published 2024-12-27 | Updated 2024-12-27 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 29eac3eca72d4c2a71122050c37cd7d8f73ac4f3
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before aaa90844afd499c9142d0199dfda74439314c013
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 0c0a4eae26ac78379d0c1db053de168a8febc6c9
affected

Default status
affected

6.11.11
unaffected

6.12.2
unaffected

6.13-rc1
unaffected

References

git.kernel.org/...c/29eac3eca72d4c2a71122050c37cd7d8f73ac4f3

git.kernel.org/...c/aaa90844afd499c9142d0199dfda74439314c013

git.kernel.org/...c/0c0a4eae26ac78379d0c1db053de168a8febc6c9

cve.org (CVE-2024-53187)

nvd.nist.gov (CVE-2024-53187)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-53187

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.