Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-53145
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-24 Dec, 2024 | 11:28
Updated At-04 May, 2025 | 09:54
Rejected At-
▼CVE Numbering Authority (CNA)
um: Fix potential integer overflow during physmem setup

In the Linux kernel, the following vulnerability has been resolved: um: Fix potential integer overflow during physmem setup This issue happens when the real map size is greater than LONG_MAX, which can be easily triggered on UML/i386.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/um/kernel/physmem.c
Default Status
unaffected
Versions
Affected
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before 5c710f45811e7e2bfcf703980c306f19c7e1ecfe (git)
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before e6102b72edc4eb8c0858df00ba74b5ce579c8fa2 (git)
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before 1bd118c5f887802cef2d9ba0d1917258667f1cae (git)
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before 1575df968650d11771359e5ac78278c5b0cc19f3 (git)
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before a875c023155ea92b75d6323977003e64d92ae7fc (git)
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before d1a211e5210d31da8f49fc0021bf7129b726468c (git)
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before a9c95f787b88b29165563fd97761032db77116e7 (git)
  • From fe205bdd1321f95f8f3c35d243ea7cb22af8fbe1 before a98b7761f697e590ed5d610d87fa12be66f23419 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/um/kernel/physmem.c
Default Status
affected
Versions
Affected
  • 4.1
Unaffected
  • From 0 before 4.1 (semver)
  • From 5.4.287 through 5.4.* (semver)
  • From 5.10.231 through 5.10.* (semver)
  • From 5.15.174 through 5.15.* (semver)
  • From 6.1.120 through 6.1.* (semver)
  • From 6.6.64 through 6.6.* (semver)
  • From 6.11.11 through 6.11.* (semver)
  • From 6.12.2 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/5c710f45811e7e2bfcf703980c306f19c7e1ecfe
N/A
https://git.kernel.org/stable/c/e6102b72edc4eb8c0858df00ba74b5ce579c8fa2
N/A
https://git.kernel.org/stable/c/1bd118c5f887802cef2d9ba0d1917258667f1cae
N/A
https://git.kernel.org/stable/c/1575df968650d11771359e5ac78278c5b0cc19f3
N/A
https://git.kernel.org/stable/c/a875c023155ea92b75d6323977003e64d92ae7fc
N/A
https://git.kernel.org/stable/c/d1a211e5210d31da8f49fc0021bf7129b726468c
N/A
https://git.kernel.org/stable/c/a9c95f787b88b29165563fd97761032db77116e7
N/A
https://git.kernel.org/stable/c/a98b7761f697e590ed5d610d87fa12be66f23419
N/A
Details not found