๐Ÿ” CVE Alert

CVE-2024-53107

MEDIUM 5.5

fs/proc/task_mmu: prevent integer overflow in pagemap_scan_get_args()

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fs/proc/task_mmu: prevent integer overflow in pagemap_scan_get_args() The "arg->vec_len" variable is a u64 that comes from the user at the start of the function. The "arg->vec_len * sizeof(struct page_region))" multiplication can lead to integer wrapping. Use size_mul() to avoid that. Also the size_add/mul() functions work on unsigned long so for 32bit systems we need to ensure that "arg->vec_len" fits in an unsigned long.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 2, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
52526ca7fdb905a768a93f8faa418e9b988fc34b < adee03f8903c58a6a559f21388a430211fac8ce9 52526ca7fdb905a768a93f8faa418e9b988fc34b < 669b0cb81e4e4e78cff77a5b367c7f70c0c6c05e
Linux / Linux
6.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/adee03f8903c58a6a559f21388a430211fac8ce9 git.kernel.org: https://git.kernel.org/stable/c/669b0cb81e4e4e78cff77a5b367c7f70c0c6c05e