CVE-2024-26884

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix hashtab overflow check on 32-bit arches The hashtab code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. However, on 32-bit arches, the roundup code itself can overflow by doing a 32-bit left-shift of an unsigned long value, which is undefined behaviour, so it is not guaranteed to truncate neatly. This was triggered by syzbot on the DEVMAP_HASH type, which contains the same check, copied from the hashtab code. So apply the same fix to hashtab, by moving the overflow check to before the roundup.
References
Link Resource
https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 Patch
https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d Patch
https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 Patch
https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 Patch
https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 Patch
https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace Patch
https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 Patch
https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 Patch
https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e Patch
https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 Patch
https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d Patch
https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 Patch
https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 Patch
https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 Patch
https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace Patch
https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 Patch
https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 Patch
https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 - Patch () https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 - Patch
References () https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d - Patch () https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d - Patch
References () https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 - Patch () https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 - Patch
References () https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 - Patch () https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 - Patch
References () https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 - Patch () https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 - Patch
References () https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace - Patch () https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace - Patch
References () https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 - Patch () https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 - Patch
References () https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 - Patch () https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 - Patch
References () https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e - Patch () https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e - Patch

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

30 Oct 2024, 20:35

Type Values Removed Values Added
CWE CWE-190

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

29 Apr 2024, 20:03

Type Values Removed Values Added
CWE CWE-119
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 - () https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 - Patch
References () https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d - () https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d - Patch
References () https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 - () https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 - Patch
References () https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 - () https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 - Patch
References () https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 - () https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 - Patch
References () https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace - () https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace - Patch
References () https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 - () https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 - Patch
References () https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 - () https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 - Patch
References () https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e - () https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e - Patch
First Time Linux linux Kernel
Linux
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: corrige la comprobación de desbordamiento de hashtab en arcos de 32 bits. El código hashtab se basa en roundup_pow_of_two() para calcular el número de depósitos de hash y contiene una comprobación de desbordamiento comprobando si el valor resultante es 0. Sin embargo, en arcos de 32 bits, el código de resumen en sí puede desbordarse al realizar un desplazamiento hacia la izquierda de 32 bits de un valor largo sin signo, lo cual es un comportamiento indefinido, por lo que no se garantiza que se trunque claramente. Esto fue activado por syzbot en el tipo DEVMAP_HASH, que contiene la misma verificación, copiada del código hashtab. Así que aplique la misma solución a hashtab, moviendo la verificación de desbordamiento antes del resumen.

17 Apr 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 11:15

Updated : 2024-11-21 09:03


NVD link : CVE-2024-26884

Mitre link : CVE-2024-26884

CVE.ORG link : CVE-2024-26884


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-190

Integer Overflow or Wraparound