CVE-2024-50262

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key() trie_get_next_key() allocates a node stack with size trie->max_prefixlen, while it writes (trie->max_prefixlen + 1) nodes to the stack when it has full paths from the root to leaves. For example, consider a trie with max_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ... 0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with .prefixlen = 8 make 9 nodes be written on the node stack with size 8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*

History

13 Nov 2024, 21:10

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21 - () https://git.kernel.org/stable/c/13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21 - Patch
References () https://git.kernel.org/stable/c/590976f921723d53ac199c01d5b7b73a94875e68 - () https://git.kernel.org/stable/c/590976f921723d53ac199c01d5b7b73a94875e68 - Patch
References () https://git.kernel.org/stable/c/86c8ebe02d8806dd8878d0063e8e185622ab6ea6 - () https://git.kernel.org/stable/c/86c8ebe02d8806dd8878d0063e8e185622ab6ea6 - Patch
References () https://git.kernel.org/stable/c/90a6e0e1e151ef7a9282e78f54c3091de2dcc99c - () https://git.kernel.org/stable/c/90a6e0e1e151ef7a9282e78f54c3091de2dcc99c - Patch
References () https://git.kernel.org/stable/c/91afbc0eb3c90258ae378ae3c6ead3d2371e926d - () https://git.kernel.org/stable/c/91afbc0eb3c90258ae378ae3c6ead3d2371e926d - Patch
References () https://git.kernel.org/stable/c/a035df0b98df424559fd383e8e1a268f422ea2ba - () https://git.kernel.org/stable/c/a035df0b98df424559fd383e8e1a268f422ea2ba - Patch
References () https://git.kernel.org/stable/c/c4b4f9a9ab82238cb158fa4fe61a8c0ae21a4980 - () https://git.kernel.org/stable/c/c4b4f9a9ab82238cb158fa4fe61a8c0ae21a4980 - Patch
References () https://git.kernel.org/stable/c/e8494ac079814a53fbc2258d2743e720907488ed - () https://git.kernel.org/stable/c/e8494ac079814a53fbc2258d2743e720907488ed - Patch
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*

12 Nov 2024, 13:56

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Se corrige la escritura fuera de los límites en trie_get_next_key() trie_get_next_key() asigna una pila de nodos con tamaño trie->max_prefixlen, mientras escribe (trie->max_prefixlen + 1) nodos en la pila cuando tiene rutas completas desde la raíz hasta las hojas. Por ejemplo, considere un trie con max_prefixlen es 8, y los nodos con clave 0x00/0, 0x00/1, 0x00/2, ... 0x00/8 insertados. Las llamadas posteriores a trie_get_next_key con _key con .prefixlen = 8 hacen que se escriban 9 nodos en la pila de nodos con tamaño 8.

09 Nov 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-09 11:15

Updated : 2024-11-13 21:10


NVD link : CVE-2024-50262

Mitre link : CVE-2024-50262

CVE.ORG link : CVE-2024-50262


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write