๐Ÿ” CVE Alert

CVE-2024-57890

MEDIUM 5.5

RDMA/uverbs: Prevent integer overflow issue

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA/uverbs: Prevent integer overflow issue In the expression "cmd.wqe_size * cmd.wr_count", both variables are u32 values that come from the user so the multiplication can lead to integer wrapping. Then we pass the result to uverbs_request_next_ptr() which also could potentially wrap. The "cmd.sge_count * sizeof(struct ib_uverbs_sge)" multiplication can also overflow on 32bit systems although it's fine on 64bit systems. This patch does two things. First, I've re-arranged the condition in uverbs_request_next_ptr() so that the use controlled variable "len" is on one side of the comparison by itself without any math. Then I've modified all the callers to use size_mul() for the multiplications.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
67cdb40ca444c09853ab4d8a41cf547ac26a4de4 < c57721b24bd897338a81a0ca5fff41600f0f1ad1 67cdb40ca444c09853ab4d8a41cf547ac26a4de4 < 42a6eb4ed7a9a41ba0b83eb0c7e0225b5fca5608 67cdb40ca444c09853ab4d8a41cf547ac26a4de4 < c2f961c46ea0e5274c5c320d007c2dd949cf627a 67cdb40ca444c09853ab4d8a41cf547ac26a4de4 < 346db03e9926ab7117ed9bf19665699c037c773c 67cdb40ca444c09853ab4d8a41cf547ac26a4de4 < b92667f755749cf10d9ef1088865c555ae83ffb7 67cdb40ca444c09853ab4d8a41cf547ac26a4de4 < b3ef4ae713360501182695dd47d6b4f6e1a43eb8 67cdb40ca444c09853ab4d8a41cf547ac26a4de4 < d0257e089d1bbd35c69b6c97ff73e3690ab149a9
Linux / Linux
2.6.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c57721b24bd897338a81a0ca5fff41600f0f1ad1 git.kernel.org: https://git.kernel.org/stable/c/42a6eb4ed7a9a41ba0b83eb0c7e0225b5fca5608 git.kernel.org: https://git.kernel.org/stable/c/c2f961c46ea0e5274c5c320d007c2dd949cf627a git.kernel.org: https://git.kernel.org/stable/c/346db03e9926ab7117ed9bf19665699c037c773c git.kernel.org: https://git.kernel.org/stable/c/b92667f755749cf10d9ef1088865c555ae83ffb7 git.kernel.org: https://git.kernel.org/stable/c/b3ef4ae713360501182695dd47d6b4f6e1a43eb8 git.kernel.org: https://git.kernel.org/stable/c/d0257e089d1bbd35c69b6c97ff73e3690ab149a9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html