摘要:
libbpf security update
安全等级: Medium
公告ID: KylinSec-SA-2025-2622
发布日期: 2025年7月14日
关联CVE: CVE-2024-27050
A mirror of bpf-next linux tree bpf-next/tools/lib/bpf directory plus its supporting header files. The version of the package reflects the version of ABI.
Security Fix(es):
In the Linux kernel, the following vulnerability has been resolved:
libbpf: Use OPTS_SET() macro in bpf_xdp_query()
When the feature_flags and xdp_zc_max_segs fields were added to the libbpf
bpf_xdp_query_opts, the code writing them did not use the OPTS_SET() macro.
This causes libbpf to write to those fields unconditionally, which means
that programs compiled against an older version of libbpf (with a smaller
size of the bpf_xdp_query_opts struct) will have its stack corrupted by
libbpf writing out of bounds.
The patch adding the feature_flags field has an early bail out if the
feature_flags field is not part of the opts struct (via the OPTS_HAS)
macro, but the patch adding xdp_zc_max_segs does not. For consistency, this
fix just changes the assignments to both fields to use the OPTS_SET()
macro.(CVE-2024-27050)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-27050 | V6 | libbpf | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
libbpf | x86_64 | 1.2.2-9.ks6 |
libbpf-devel | x86_64 | 1.2.2-9.ks6 |
libbpf-static | x86_64 | 1.2.2-9.ks6 |
libbpf | aarch64 | 1.2.2-9.ks6 |
libbpf-devel | aarch64 | 1.2.2-9.ks6 |
libbpf-static | aarch64 | 1.2.2-9.ks6 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名