Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26884
HistoryApr 17, 2024 - 12:00 a.m.

CVE-2024-26884

2024-04-1700:00:00
ubuntu.com
ubuntu.com
7
linux kernel
bpf
vulnerability fix
hashtab overflow
32-bit arches

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: bpf:
Fix hashtab overflow check on 32-bit arches The hashtab code relies on
roundup_pow_of_two() to compute the number of hash buckets, and contains an
overflow check by checking if the resulting value is 0. However, on 32-bit
arches, the roundup code itself can overflow by doing a 32-bit left-shift
of an unsigned long value, which is undefined behaviour, so it is not
guaranteed to truncate neatly. This was triggered by syzbot on the
DEVMAP_HASH type, which contains the same check, copied from the hashtab
code. So apply the same fix to hashtab, by moving the overflow check to
before the roundup.

Rows per page:
1-10 of 791

References

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

5.1%