In the Linux kernel, the following vulnerability has been resolved:
bpf: Check validity of link->type in bpf_link_show_fdinfo()
If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing
bpf_link_type_strs[link->type] may result in an out-of-bounds access.
To spot such missed invocations early in the future, checking the
validity of link->type in bpf_link_show_fdinfo() and emitting a warning
when such invocations are missed.
References
Configurations
Configuration 1 (hide)
|
History
09 Jan 2025, 16:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
02 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Dec 2024, 15:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-125 | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/8421d4c8762bd022cb491f2f0f7019ef51b4f0a7 - Patch | |
References | () https://git.kernel.org/stable/c/b3eb1b6a9f745d6941b345f0fae014dc8bb06d36 - Patch | |
References | () https://git.kernel.org/stable/c/d5092b0a1aaf35d77ebd8d33384d7930bec5cb5d - Patch | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
CPE | cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* |
25 Nov 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-25 22:15
Updated : 2025-01-09 16:16
NVD link : CVE-2024-53099
Mitre link : CVE-2024-53099
CVE.ORG link : CVE-2024-53099
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read