• 公告ID (KylinSec-SA-2024-3435)

摘要:

In the Linux kernel, the following vulnerability has been resolved:

bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable

Test case dummy_st_ops/dummy_init_ret_value passes NULL as the first
parameter of the test_1() function. Mark this parameter as nullable to
make verifier aware of such possibility.
Otherwise, NULL check in the test_1() code:

SEC("struct_ops/test_1")
int BPF_PROG(test_1, struct bpf_dummy_ops_state *state)
{
if (!state)
return ...;

... access state ...
}

Might be removed by verifier, thus triggering NULL pointer dereference
under certain conditions.

安全等级: Low

公告ID: KylinSec-SA-2024-3435

发布日期: 2024年8月28日

关联CVE: CVE-2024-42151  

  • 详细介绍

1. 漏洞描述

   

In the Linux kernel, the following vulnerability has been resolved:

bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable

Test case dummy_st_ops/dummy_init_ret_value passes NULL as the first
parameter of the test_1() function. Mark this parameter as nullable to
make verifier aware of such possibility.
Otherwise, NULL check in the test_1() code:

SEC("struct_ops/test_1")
int BPF_PROG(test_1, struct bpf_dummy_ops_state *state)
{
if (!state)
return ...;

... access state ...
}

Might be removed by verifier, thus triggering NULL pointer dereference
under certain conditions.

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-42151 KY3.4-5A kernel Unaffected
CVE-2024-42151 KY3.5.3 kernel Unaffected
CVE-2024-42151 V6 kernel Unaffected

3. 影响组件

    无

4. 修复版本

    无

5. 修复方法

   无

6. 下载链接

    无
上一篇:KylinSec-SA-2024-3434 下一篇:KylinSec-SA-2024-3436