跳转到帖子

Red Hat: CVE-2024-50262: kernel: bpf: Fix out-of-bounds write in trie_get_next_key() (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2024-50262: kernel: bpf: Fix out-of-bounds write in trie_get_next_key() (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
11/09/2024
Created
02/11/2025
Added
02/10/2025
Modified
02/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key() trie_get_next_key() allocates a node stack with size trie->max_prefixlen, while it writes (trie->max_prefixlen + 1) nodes to the stack when it has full paths from the root to leaves. For example, consider a trie with max_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ... 0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with .prefixlen = 8 make 9 nodes be written on the node stack with size 8.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-rt

References

  • CVE-2024-50262
  • RHSA-2024:10942
  • RHSA-2024:11486
  • 查看数 694
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…