CVE-2024-53107

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53107
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53107.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53107
Downstream
Related
Published
2024-12-02T13:44:39Z
Modified
2025-10-17T16:58:12.785173Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
fs/proc/task_mmu: prevent integer overflow in pagemap_scan_get_args()
Details

In the Linux kernel, the following vulnerability has been resolved:

fs/proc/taskmmu: prevent integer overflow in pagemapscangetargs()

The "arg->veclen" variable is a u64 that comes from the user at the start of the function. The "arg->veclen * sizeof(struct pageregion))" multiplication can lead to integer wrapping. Use sizemul() to avoid that.

Also the sizeadd/mul() functions work on unsigned long so for 32bit systems we need to ensure that "arg->veclen" fits in an unsigned long.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
52526ca7fdb905a768a93f8faa418e9b988fc34b
Fixed
adee03f8903c58a6a559f21388a430211fac8ce9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
52526ca7fdb905a768a93f8faa418e9b988fc34b
Fixed
669b0cb81e4e4e78cff77a5b367c7f70c0c6c05e

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.11.1
v6.11.2
v6.11.3
v6.11.4
v6.11.5
v6.11.6
v6.11.7
v6.11.8
v6.11.9
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.6
v6.6-rc5
v6.6-rc6
v6.6-rc7
v6.7
v6.7-rc1
v6.7-rc2
v6.7-rc3
v6.7-rc4
v6.7-rc5
v6.7-rc6
v6.7-rc7
v6.7-rc8
v6.8
v6.8-rc1
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "signature_version": "v1",
        "target": {
            "function": "pagemap_scan_get_args",
            "file": "fs/proc/task_mmu.c"
        },
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adee03f8903c58a6a559f21388a430211fac8ce9",
        "digest": {
            "function_hash": "143371125680926656847668414153246809088",
            "length": 1130.0
        },
        "id": "CVE-2024-53107-0c395931",
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "target": {
            "function": "pagemap_scan_get_args",
            "file": "fs/proc/task_mmu.c"
        },
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@669b0cb81e4e4e78cff77a5b367c7f70c0c6c05e",
        "digest": {
            "function_hash": "143371125680926656847668414153246809088",
            "length": 1130.0
        },
        "id": "CVE-2024-53107-397c58d7",
        "signature_type": "Function"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "fs/proc/task_mmu.c"
        },
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@adee03f8903c58a6a559f21388a430211fac8ce9",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "60735432893787126327322046856811503279",
                "298882871847214045658408957375185218183",
                "117842439130220713928877887690812462318",
                "304078933149785200820302257241112466607",
                "66596199589917412133739644238914756694",
                "236473760494547819444731037753579219106"
            ]
        },
        "id": "CVE-2024-53107-3995ec31",
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "file": "fs/proc/task_mmu.c"
        },
        "deprecated": false,
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@669b0cb81e4e4e78cff77a5b367c7f70c0c6c05e",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "60735432893787126327322046856811503279",
                "298882871847214045658408957375185218183",
                "117842439130220713928877887690812462318",
                "304078933149785200820302257241112466607",
                "66596199589917412133739644238914756694",
                "236473760494547819444731037753579219106"
            ]
        },
        "id": "CVE-2024-53107-743f5d20",
        "signature_type": "Line"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.11.10