CVE-2024-38662

CVSS v3.1 4.7 (Medium)
47% Progress
EPSS 0.04 % (10th)
0.04% Progress
Affected Products 1
Advisories 15
NVD Status Analyzed

In the Linux kernel, the following vulnerability has been resolved:

bpf: Allow delete from sockmap/sockhash only if update is allowed

We have seen an influx of syzkaller reports where a BPF program attached to
a tracepoint triggers a locking rule violation by performing a map_delete
on a sockmap/sockhash.

We don't intend to support this artificial use scenario. Extend the
existing verifier allowed-program-type check for updating sockmap/sockhash
to also cover deleting from a map.

From now on only BPF programs which were previously allowed to update
sockmap/sockhash can delete from these map types.

Weaknesses
CWE-NVD-noinfo
CVE Status
PUBLISHED
NVD Status
Analyzed
CNA
kernel.org
Published Date
2024-06-21 12:15:11
(2 months ago)
Updated Date
2024-06-24 18:34:17
(2 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 5.10 version and prior 5.10.219 version cpe:2.3:o:linux:linux_kernel >= 5.10 < 5.10.219
  Linux Kernel from 5.15 version and prior 5.15.161 version cpe:2.3:o:linux:linux_kernel >= 5.15 < 5.15.161
  Linux Kernel from 6.1 version and prior 6.1.93 version cpe:2.3:o:linux:linux_kernel >= 6.1 < 6.1.93
  Linux Kernel from 6.6 version and prior 6.6.33 version cpe:2.3:o:linux:linux_kernel >= 6.6 < 6.6.33
  Linux Kernel from 6.9 version and prior 6.9.4 version cpe:2.3:o:linux:linux_kernel >= 6.9 < 6.9.4
  Linux Kernel 6.10.0 Rc1 cpe:2.3:o:linux:linux_kernel:6.10.0:rc1
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...