๐Ÿ” CVE Alert

CVE-2024-58000

UNKNOWN 0.0

io_uring: prevent reg-wait speculations

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: io_uring: prevent reg-wait speculations With *ENTER_EXT_ARG_REG instead of passing a user pointer with arguments for the waiting loop the user can specify an offset into a pre-mapped region of memory, in which case the [offset, offset + sizeof(io_uring_reg_wait)) will be intepreted as the argument. As we address a kernel array using a user given index, it'd be a subject to speculation type of exploits. Use array_index_nospec() to prevent that. Make sure to pass not the full region size but truncate by the maximum offset allowed considering the structure size.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
aa00f67adc2c0d6439f81b5a81ff181377c47a7e < 2a6de94df7bfa76d9850443547e7b3333f63a16a aa00f67adc2c0d6439f81b5a81ff181377c47a7e < 29b95ac917927ce9f95bf38797e16333ecb489b1
Linux / Linux
6.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2a6de94df7bfa76d9850443547e7b3333f63a16a git.kernel.org: https://git.kernel.org/stable/c/29b95ac917927ce9f95bf38797e16333ecb489b1