Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-38662
HistoryJun 21, 2024 - 12:00 a.m.

CVE-2024-38662

2024-06-2100:00:00
ubuntu.com
ubuntu.com
2
linux kernel
vulnerability
bpf
sockmap
sockhash
deletion
update
locking rule

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.0%

In the Linux kernel, the following vulnerability has been resolved: bpf:
Allow delete from sockmap/sockhash only if update is allowed We have seen
an influx of syzkaller reports where a BPF program attached to a tracepoint
triggers a locking rule violation by performing a map_delete on a
sockmap/sockhash. We don’t intend to support this artificial use scenario.
Extend the existing verifier allowed-program-type check for updating
sockmap/sockhash to also cover deleting from a map. From now on only BPF
programs which were previously allowed to update sockmap/sockhash can
delete from these map types.

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

7 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.0%