• CVE-2024-38662

发布时间: 2024年6月28日

修改时间: 2024年10月31日

概要

In the Linux kernel, the following vulnerability has been resolved: bpf: Allow delete from sockmap/sockhash only if update is allowed We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_delete on a sockmap/sockhash. We don't intend to support this artificial use scenario. Extend the existing verifier allowed-program-type check for updating sockmap/sockhash to also cover deleting from a map. From now on only BPF programs which were previously allowed to update sockmap/sockhash can delete from these map types.

CVSS v3 指标

NVD openEuler
Confidentiality None None
Attack Vector Local Local
CVSS评分 4.7 4.7
Attack Complexity High High
Privileges Required Low Low
Scope Unchanged Unchanged
Integrity High None
User Interaction None None
Availability None High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4961 kernel security update 2025年2月28日

影响产品

产品 状态
KY3.5.2 kernel Fixed
V6 kernel Fixed