CVE-2024-35880

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: hold io_buffer_list reference over mmap If we look up the kbuf, ensure that it doesn't get unregistered until after we're done with it. Since we're inside mmap, we cannot safely use the io_uring lock. Rely on the fact that we can lookup the buffer list under RCU now and grab a reference to it, preventing it from being unregistered until we're done with it. The lookup returns the io_buffer_list directly with it referenced.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

History

24 Sep 2025, 21:09

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc8:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793 - () https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793 - Patch
References () https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9 - () https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9 - Patch
References () https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66 - () https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66 - Patch

21 Nov 2024, 09:21

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/kbuf: mantiene la referencia io_buffer_list sobre mmap. Si buscamos el kbuf, nos aseguramos de que no se cancele el registro hasta que hayamos terminado con él. Como estamos dentro de mmap, no podemos usar de forma segura el bloqueo io_uring. Confíe en el hecho de que ahora podemos buscar la lista de búfer en RCU y obtener una referencia a ella, evitando que se cancele el registro hasta que hayamos terminado. La búsqueda devuelve io_buffer_list directamente con su referencia.
References () https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793 - () https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793 -
References () https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9 - () https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9 -
References () https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66 - () https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66 -

19 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 09:15

Updated : 2025-09-24 21:09


NVD link : CVE-2024-35880

Mitre link : CVE-2024-35880

CVE.ORG link : CVE-2024-35880


JSON object : View

Products Affected

linux

  • linux_kernel