Bug 1224523 (CVE-2024-35880) - VUL-0: CVE-2024-35880: kernel: io_uring/kbuf: hold io_buffer_list reference over mmap
Summary: VUL-0: CVE-2024-35880: kernel: io_uring/kbuf: hold io_buffer_list reference o...
Status: IN_PROGRESS
Alias: CVE-2024-35880
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/406569/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-35880:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-20 13:28 UTC by SMASH SMASH
Modified: 2024-07-08 14:49 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-20 13:28:29 UTC
In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: hold io_buffer_list reference over mmap

If we look up the kbuf, ensure that it doesn't get unregistered until
after we're done with it. Since we're inside mmap, we cannot safely use
the io_uring lock. Rely on the fact that we can lookup the buffer list
under RCU now and grab a reference to it, preventing it from being
unregistered until we're done with it. The lookup returns the
io_buffer_list directly with it referenced.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-35880
https://www.cve.org/CVERecord?id=CVE-2024-35880
https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-35880.mbox