Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-35880

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-19 May, 2024 | 08:34
Updated At-04 May, 2025 | 09:07
Rejected At-
Credits

io_uring/kbuf: hold io_buffer_list reference over mmap

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: hold io_buffer_list reference over mmap If we look up the kbuf, ensure that it doesn't get unregistered until after we're done with it. Since we're inside mmap, we cannot safely use the io_uring lock. Rely on the fact that we can lookup the buffer list under RCU now and grab a reference to it, preventing it from being unregistered until we're done with it. The lookup returns the io_buffer_list directly with it referenced.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:19 May, 2024 | 08:34
Updated At:04 May, 2025 | 09:07
Rejected At:
▼CVE Numbering Authority (CNA)
io_uring/kbuf: hold io_buffer_list reference over mmap

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: hold io_buffer_list reference over mmap If we look up the kbuf, ensure that it doesn't get unregistered until after we're done with it. Since we're inside mmap, we cannot safely use the io_uring lock. Rely on the fact that we can lookup the buffer list under RCU now and grab a reference to it, preventing it from being unregistered until we're done with it. The lookup returns the io_buffer_list directly with it referenced.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • io_uring/io_uring.c
  • io_uring/kbuf.c
  • io_uring/kbuf.h
Default Status
unaffected
Versions
Affected
  • From 09f7520048eaaee9709091cd2787966f807da7c5 before 65938e81df2197203bda4b9a0c477e7987218d66 (git)
  • From 5cf4f52e6d8aa2d3b7728f568abbf9d42a3af252 before 5fd8e2359498043e0b5329a05f02d10a9eb91eb9 (git)
  • From 5cf4f52e6d8aa2d3b7728f568abbf9d42a3af252 before 561e4f9451d65fc2f7eef564e0064373e3019793 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • io_uring/io_uring.c
  • io_uring/kbuf.c
  • io_uring/kbuf.h
Default Status
affected
Versions
Affected
  • 6.7
Unaffected
  • From 0 before 6.7 (semver)
  • From 6.6.26 through 6.6.* (semver)
  • From 6.8.5 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
N/A
https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
N/A
https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
N/A
Hyperlink: https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*
Default Status
affected
Versions
Affected
  • 6.7
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Default Status
affected
Versions
Affected
  • From 09f7520048ea before 65938e81df21 (git)
  • From 5cf4f52e6d8a before 5fd8e2359498 (git)
  • From 5cf4f52e6d8a before 561e4f9451d6 (git)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
x_transferred
https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
x_transferred
https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
x_transferred
Hyperlink: https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:19 May, 2024 | 09:15
Updated At:20 May, 2024 | 13:00

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: hold io_buffer_list reference over mmap If we look up the kbuf, ensure that it doesn't get unregistered until after we're done with it. Since we're inside mmap, we cannot safely use the io_uring lock. Rely on the fact that we can lookup the buffer list under RCU now and grab a reference to it, preventing it from being unregistered until we're done with it. The lookup returns the io_buffer_list directly with it referenced.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
CPE Matches

Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66416baaa9-dc9f-4396-8d5f-8c081fb06d67
N/A
Hyperlink: https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found