CVE-2024-53148

In the Linux kernel, the following vulnerability has been resolved: comedi: Flush partial mappings in error case If some remap_pfn_range() calls succeeded before one failed, we still have buffer pages mapped into the userspace page tables when we drop the buffer reference with comedi_buf_map_put(bm). The userspace mappings are only cleaned up later in the mmap error path. Fix it by explicitly flushing all mappings in our VMA on the error path. See commit 79a61cc3fc04 ("mm: avoid leaving partial pfn mappings around in error case").
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Oct 2025, 14:45

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: comedi: vaciar asignaciones parciales en caso de error. Si algunas llamadas a remap_pfn_range() tuvieron éxito antes de que una fallara, todavía tenemos páginas de búfer asignadas a las tablas de páginas del espacio de usuario cuando eliminamos la referencia de búfer con comedi_buf_map_put (bm). Las asignaciones del espacio de usuario solo se limpian más adelante en la ruta de error mmap. Solucionelo eliminando explícitamente todas las asignaciones en nuestro VMA en la ruta del error. Consulte el commit 79a61cc3fc04 ("mm: evite dejar asignaciones pfn parciales en caso de error").
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/16c507df509113c037cdc0ba642b9ab3389bd26c - () https://git.kernel.org/stable/c/16c507df509113c037cdc0ba642b9ab3389bd26c - Patch
References () https://git.kernel.org/stable/c/297f14fbb81895f4ccdb0ad25d196786d6461e00 - () https://git.kernel.org/stable/c/297f14fbb81895f4ccdb0ad25d196786d6461e00 - Patch
References () https://git.kernel.org/stable/c/57f048c2d205b85e34282a9b0b0ae177e84c2f44 - () https://git.kernel.org/stable/c/57f048c2d205b85e34282a9b0b0ae177e84c2f44 - Patch
References () https://git.kernel.org/stable/c/8797b7712de704dc231f9e821d8eb3b9aeb3a032 - () https://git.kernel.org/stable/c/8797b7712de704dc231f9e821d8eb3b9aeb3a032 - Patch
References () https://git.kernel.org/stable/c/9b07fb464eb69a752406e78e62ab3a60bfa7b00d - () https://git.kernel.org/stable/c/9b07fb464eb69a752406e78e62ab3a60bfa7b00d - Patch
References () https://git.kernel.org/stable/c/b9322408d83accc8b96322bc7356593206288c56 - () https://git.kernel.org/stable/c/b9322408d83accc8b96322bc7356593206288c56 - Patch
References () https://git.kernel.org/stable/c/c6963a06ce5c61d3238751ada04ee1569663a828 - () https://git.kernel.org/stable/c/c6963a06ce5c61d3238751ada04ee1569663a828 - Patch
References () https://git.kernel.org/stable/c/ce8f9fb651fac95dd41f69afe54d935420b945bd - () https://git.kernel.org/stable/c/ce8f9fb651fac95dd41f69afe54d935420b945bd - Patch

24 Dec 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-24 12:15

Updated : 2025-10-08 14:45


NVD link : CVE-2024-53148

Mitre link : CVE-2024-53148

CVE.ORG link : CVE-2024-53148


JSON object : View

Products Affected

linux

  • linux_kernel