In the Linux kernel, the following vulnerability has been resolved:
filemap: Fix bounds checking in filemap_read()
If the caller supplies an iocb->kipos value that is close to the filesystem upper limit, and an iterator with a count that causes us to overflow that limit, then filemapread() enters an infinite loop.
This behaviour was discovered when testing xfstests generic/525 with the "localio" optimisation for loopback NFS mounts.
[
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1752.0,
"function_hash": "262216662783609357023364943554337223383"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@26530b757c81f1389fb33ae0357500150933161b",
"target": {
"file": "mm/filemap.c",
"function": "filemap_read"
},
"id": "CVE-2024-50272-0bafb11b"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"156655762538144989490468795349173089038",
"185453468918922388055401171329885289600",
"123077692860576485717587162712533312832",
"287673527888335781680625050369715211243"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ace149e0830c380ddfce7e466fe860ca502fe4ee",
"target": {
"file": "mm/filemap.c"
},
"id": "CVE-2024-50272-33553334"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"156655762538144989490468795349173089038",
"185453468918922388055401171329885289600",
"123077692860576485717587162712533312832",
"287673527888335781680625050369715211243"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2746ab3bbc9c6408da5cd072653ec8c24749235",
"target": {
"file": "mm/filemap.c"
},
"id": "CVE-2024-50272-50fe0f6e"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1784.0,
"function_hash": "56654323811398526517078875125502270106"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ace149e0830c380ddfce7e466fe860ca502fe4ee",
"target": {
"file": "mm/filemap.c",
"function": "filemap_read"
},
"id": "CVE-2024-50272-9b2e0afe"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"156655762538144989490468795349173089038",
"257944452056499771846564214287585044847",
"161365111911936195587947946462743048195",
"170725820493823057046370778894240788744"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6cc52df69e8464811f9f6fc12f7aaa78451eb0b8",
"target": {
"file": "mm/filemap.c"
},
"id": "CVE-2024-50272-a98e08fe"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1744.0,
"function_hash": "61397680705100486385702317635877096610"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6cc52df69e8464811f9f6fc12f7aaa78451eb0b8",
"target": {
"file": "mm/filemap.c",
"function": "filemap_read"
},
"id": "CVE-2024-50272-afd96f6b"
},
{
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"digest": {
"line_hashes": [
"156655762538144989490468795349173089038",
"185453468918922388055401171329885289600",
"123077692860576485717587162712533312832",
"287673527888335781680625050369715211243"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@26530b757c81f1389fb33ae0357500150933161b",
"target": {
"file": "mm/filemap.c"
},
"id": "CVE-2024-50272-b220d634"
},
{
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"digest": {
"length": 1799.0,
"function_hash": "155103840078629954180983520919082403085"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2746ab3bbc9c6408da5cd072653ec8c24749235",
"target": {
"file": "mm/filemap.c",
"function": "filemap_read"
},
"id": "CVE-2024-50272-b8d83894"
}
]