First published: Mon Oct 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: io_uring: check if we need to reschedule during overflow flush In terms of normal application usage, this list will always be empty. And if an application does overflow a bit, it'll have a few entries. However, nothing obviously prevents syzbot from running a test case that generates a ton of overflow entries, and then flushing them can take quite a while. Check for needing to reschedule while flushing, and drop our locks and do so if necessary. There's no state to maintain here as overflows always prune from head-of-list, hence it's fine to drop and reacquire the locks at the end of the loop.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=6.1<6.1.113 | |
Linux kernel | >=6.6<6.6.57 | |
Linux kernel | >=6.11<6.11.4 | |
Linux Kernel | >=6.1<6.1.113 | |
Linux Kernel | >=6.6<6.6.57 | |
Linux Kernel | >=6.11<6.11.4 | |
debian/linux | <=5.10.223-1<=5.10.234-1 | 6.1.129-1 6.1.128-1 6.12.21-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50060 has been rated with a moderate severity level due to its potential impact on system stability.
To fix CVE-2024-50060, you should update the Linux kernel to a version newer than 6.1.113 or 6.6.57 or 6.11.4.
CVE-2024-50060 affects various versions of the Linux kernel, specifically those between 6.1.0 to 6.1.113, 6.6.0 to 6.6.57, and 6.11.0 to 6.11.4.
CVE-2024-50060 is classified as a reliability vulnerability related to the io_uring implementation in the Linux kernel.
There are no specific workarounds recommended for CVE-2024-50060; updating the kernel is the preferred action.