• CVE-2024-38662

发布时间: 2024年6月28日

修改时间: 2024年7月12日

概要

In the Linux kernel, the following vulnerability has been resolved:bpf: Allow delete from sockmap/sockhash only if update is allowedWe have seen an influx of syzkaller reports where a BPF program attached toa tracepoint triggers a locking rule violation by performing a map_deleteon a sockmap/sockhash.We don t intend to support this artificial use scenario. Extend theexisting verifier allowed-program-type check for updating sockmap/sockhashto also cover deleting from a map.From now on only BPF programs which were previously allowed to updatesockmap/sockhash can delete from these map types.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 4.7 4.7
Attack Complexity High High
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity High High
User Interaction None None
Availability None None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4961 kernel security update 2024年6月28日

影响产品

产品 状态
KY3.4-5A kernel Unaffected
KY3.5.2 kernel Fixed
KY3.5.2 kernel Unaffected
V6 kernel Fixed