• 公告ID (KylinSec-SA-2025-2622)

摘要:

libbpf security update

安全等级: Medium

公告ID: KylinSec-SA-2025-2622

发布日期: 2025年7月14日

关联CVE: CVE-2024-27050  

  • 详细介绍

1. 漏洞描述

   

A mirror of bpf-next linux tree bpf-next/tools/lib/bpf directory plus its supporting header files. The version of the package reflects the version of ABI.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved:

libbpf: Use OPTS_SET() macro in bpf_xdp_query()

When the feature_flags and xdp_zc_max_segs fields were added to the libbpf
bpf_xdp_query_opts, the code writing them did not use the OPTS_SET() macro.
This causes libbpf to write to those fields unconditionally, which means
that programs compiled against an older version of libbpf (with a smaller
size of the bpf_xdp_query_opts struct) will have its stack corrupted by
libbpf writing out of bounds.

The patch adding the feature_flags field has an early bail out if the
feature_flags field is not part of the opts struct (via the OPTS_HAS)
macro, but the patch adding xdp_zc_max_segs does not. For consistency, this
fix just changes the assignments to both fields to use the OPTS_SET()
macro.(CVE-2024-27050)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-27050 V6 libbpf Fixed

3. 影响组件

    libbpf

4. 修复版本

   

V6

软件名称 架构 版本号
libbpf x86_64 1.2.2-9.ks6
libbpf-devel x86_64 1.2.2-9.ks6
libbpf-static x86_64 1.2.2-9.ks6
libbpf aarch64 1.2.2-9.ks6
libbpf-devel aarch64 1.2.2-9.ks6
libbpf-static aarch64 1.2.2-9.ks6

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     libbpf   

     libbpf-devel   

     libbpf-static   

aarch64:

     libbpf   

     libbpf-devel   

     libbpf-static   

上一篇:KylinSec-SA-2025-2619 下一篇:KylinSec-SA-2025-2654