Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-35880
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-19 May, 2024 | 08:34
Updated At-04 May, 2025 | 09:07
Rejected At-
▼CVE Numbering Authority (CNA)
io_uring/kbuf: hold io_buffer_list reference over mmap

In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: hold io_buffer_list reference over mmap If we look up the kbuf, ensure that it doesn't get unregistered until after we're done with it. Since we're inside mmap, we cannot safely use the io_uring lock. Rely on the fact that we can lookup the buffer list under RCU now and grab a reference to it, preventing it from being unregistered until we're done with it. The lookup returns the io_buffer_list directly with it referenced.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • io_uring/io_uring.c
  • io_uring/kbuf.c
  • io_uring/kbuf.h
Default Status
unaffected
Versions
Affected
  • From 09f7520048eaaee9709091cd2787966f807da7c5 before 65938e81df2197203bda4b9a0c477e7987218d66 (git)
  • From 5cf4f52e6d8aa2d3b7728f568abbf9d42a3af252 before 5fd8e2359498043e0b5329a05f02d10a9eb91eb9 (git)
  • From 5cf4f52e6d8aa2d3b7728f568abbf9d42a3af252 before 561e4f9451d65fc2f7eef564e0064373e3019793 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • io_uring/io_uring.c
  • io_uring/kbuf.c
  • io_uring/kbuf.h
Default Status
affected
Versions
Affected
  • 6.7
Unaffected
  • From 0 before 6.7 (semver)
  • From 6.6.26 through 6.6.* (semver)
  • From 6.8.5 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
N/A
https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
N/A
https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:6.7:-:*:*:*:*:*:*
Default Status
affected
Versions
Affected
  • 6.7
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Default Status
affected
Versions
Affected
  • From 09f7520048ea before 65938e81df21 (git)
  • From 5cf4f52e6d8a before 5fd8e2359498 (git)
  • From 5cf4f52e6d8a before 561e4f9451d6 (git)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
x_transferred
https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
x_transferred
https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
x_transferred
Details not found