In the Linux kernel, the following vulnerability has been...
Moderate severity
Unreviewed
Published
Dec 2, 2024
to the GitHub Advisory Database
•
Updated Dec 12, 2024
Description
Published by the National Vulnerability Database
Dec 2, 2024
Published to the GitHub Advisory Database
Dec 2, 2024
Last updated
Dec 12, 2024
In the Linux kernel, the following vulnerability has been resolved:
fs/proc/task_mmu: prevent integer overflow in pagemap_scan_get_args()
The "arg->vec_len" variable is a u64 that comes from the user at the start
of the function. The "arg->vec_len * sizeof(struct page_region))"
multiplication can lead to integer wrapping. Use size_mul() to avoid
that.
Also the size_add/mul() functions work on unsigned long so for 32bit
systems we need to ensure that "arg->vec_len" fits in an unsigned long.
References