2024-07-14 02:06:08 +00:00

33 lines
1.9 KiB
JSON

{
"id": "CVE-2024-35880",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-19T09:15:09.283",
"lastModified": "2024-05-20T13:00:04.957",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: hold io_buffer_list reference over mmap\n\nIf we look up the kbuf, ensure that it doesn't get unregistered until\nafter we're done with it. Since we're inside mmap, we cannot safely use\nthe io_uring lock. Rely on the fact that we can lookup the buffer list\nunder RCU now and grab a reference to it, preventing it from being\nunregistered until we're done with it. The lookup returns the\nio_buffer_list directly with it referenced."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/kbuf: mantiene la referencia io_buffer_list sobre mmap. Si buscamos el kbuf, nos aseguramos de que no se cancele el registro hasta que hayamos terminado con \u00e9l. Como estamos dentro de mmap, no podemos usar de forma segura el bloqueo io_uring. Conf\u00ede en el hecho de que ahora podemos buscar la lista de b\u00fafer en RCU y obtener una referencia a ella, evitando que se cancele el registro hasta que hayamos terminado. La b\u00fasqueda devuelve io_buffer_list directamente con su referencia."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}