CVE-2024-53148
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
comedi: Flush partial mappings in error case<br />
<br />
If some remap_pfn_range() calls succeeded before one failed, we still have<br />
buffer pages mapped into the userspace page tables when we drop the buffer<br />
reference with comedi_buf_map_put(bm). The userspace mappings are only<br />
cleaned up later in the mmap error path.<br />
<br />
Fix it by explicitly flushing all mappings in our VMA on the error path.<br />
<br />
See commit 79a61cc3fc04 ("mm: avoid leaving partial pfn mappings around in<br />
error case").
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.29 (including) | 5.4.287 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.231 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.174 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12 (including) | 6.12.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/16c507df509113c037cdc0ba642b9ab3389bd26c
- https://git.kernel.org/stable/c/297f14fbb81895f4ccdb0ad25d196786d6461e00
- https://git.kernel.org/stable/c/57f048c2d205b85e34282a9b0b0ae177e84c2f44
- https://git.kernel.org/stable/c/8797b7712de704dc231f9e821d8eb3b9aeb3a032
- https://git.kernel.org/stable/c/9b07fb464eb69a752406e78e62ab3a60bfa7b00d
- https://git.kernel.org/stable/c/b9322408d83accc8b96322bc7356593206288c56
- https://git.kernel.org/stable/c/c6963a06ce5c61d3238751ada04ee1569663a828
- https://git.kernel.org/stable/c/ce8f9fb651fac95dd41f69afe54d935420b945bd
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
- https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html



