In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Several fixes to bpf_msg_pop_data
Several fixes to bpf_msg_pop_data,
1. In sk_msg_shift_left, we should put_page
2. if (len == 0), return early is better
3. pop the entire sk_msg (last == msg->sg.size) should be supported
4. Fix for the value of variable "a"
5. In sk_msg_shift_left, after shifting, i has already pointed to the next
element. Addtional sk_msg_iter_var_next may result in BUG.
References
Configurations
Configuration 1 (hide)
|
History
09 Jan 2025, 20:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://git.kernel.org/stable/c/275a9f3ef8fabb0cb282a62b9e164dedba7284c5 - Patch | |
References | () https://git.kernel.org/stable/c/5d609ba262475db450ba69b8e8a557bd768ac07a - Patch | |
References | () https://git.kernel.org/stable/c/785180bed9879680d8e5c5e1b54c8ae8d948f4c8 - Patch | |
References | () https://git.kernel.org/stable/c/98c7ea7d11f2588e8197db042e0291e4ac8f8346 - Patch | |
References | () https://git.kernel.org/stable/c/d26d977633d1d0b8bf9407278189bd0a8d973323 - Patch | |
References | () https://git.kernel.org/stable/c/d3f5763b3062514a234114e97bbde74d8d702449 - Patch | |
References | () https://git.kernel.org/stable/c/e1f54c61c4c9a5244eb8159dce60d248f7d97b32 - Patch | |
References | () https://git.kernel.org/stable/c/f58d3aa457e77a3d9b3df2ab081dcf9950f6029f - Patch | |
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-401 CWE-193 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
29 Dec 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-29 12:15
Updated : 2025-01-09 20:06
NVD link : CVE-2024-56720
Mitre link : CVE-2024-56720
CVE.ORG link : CVE-2024-56720
JSON object : View
Products Affected
linux
- linux_kernel