๐Ÿ” CVE Alert

CVE-2024-50222

HIGH 7.8

iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP generic/077 on x86_32 CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP=y with highmem, on huge=always tmpfs, issues a warning and then hangs (interruptibly): WARNING: CPU: 5 PID: 3517 at mm/highmem.c:622 kunmap_local_indexed+0x62/0xc9 CPU: 5 UID: 0 PID: 3517 Comm: cp Not tainted 6.12.0-rc4 #2 ... copy_page_from_iter_atomic+0xa6/0x5ec generic_perform_write+0xf6/0x1b4 shmem_file_write_iter+0x54/0x67 Fix copy_page_from_iter_atomic() by limiting it in that case (include/linux/skbuff.h skb_frag_must_loop() does similar). But going forward, perhaps CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP is too surprising, has outlived its usefulness, and should just be removed?

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 9, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
908a1ad89466c1febf20bfe0037b84fc66f8a3f8 < 4f7ffa83fa79dd52efbaef366c850aaaae06a469 908a1ad89466c1febf20bfe0037b84fc66f8a3f8 < 3a303409f271dfe0987b8f79595138340497a32d 908a1ad89466c1febf20bfe0037b84fc66f8a3f8 < c749d9b7ebbc5716af7a95f7768634b30d9446ec
Linux / Linux
6.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/4f7ffa83fa79dd52efbaef366c850aaaae06a469 git.kernel.org: https://git.kernel.org/stable/c/3a303409f271dfe0987b8f79595138340497a32d git.kernel.org: https://git.kernel.org/stable/c/c749d9b7ebbc5716af7a95f7768634b30d9446ec