U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-53148 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: comedi: Flush partial mappings in error case If some remap_pfn_range() calls succeeded before one failed, we still have buffer pages mapped into the userspace page tables when we drop the buffer reference with comedi_buf_map_put(bm). The userspace mappings are only cleaned up later in the mmap error path. Fix it by explicitly flushing all mappings in our VMA on the error path. See commit 79a61cc3fc04 ("mm: avoid leaving partial pfn mappings around in error case").


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/16c507df509113c037cdc0ba642b9ab3389bd26c
https://git.kernel.org/stable/c/297f14fbb81895f4ccdb0ad25d196786d6461e00
https://git.kernel.org/stable/c/57f048c2d205b85e34282a9b0b0ae177e84c2f44
https://git.kernel.org/stable/c/8797b7712de704dc231f9e821d8eb3b9aeb3a032
https://git.kernel.org/stable/c/9b07fb464eb69a752406e78e62ab3a60bfa7b00d
https://git.kernel.org/stable/c/b9322408d83accc8b96322bc7356593206288c56
https://git.kernel.org/stable/c/c6963a06ce5c61d3238751ada04ee1569663a828
https://git.kernel.org/stable/c/ce8f9fb651fac95dd41f69afe54d935420b945bd

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-53148
NVD Published Date:
12/24/2024
NVD Last Modified:
12/24/2024
Source:
kernel.org