Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-42161
HistoryJul 30, 2024 - 12:00 a.m.

CVE-2024-42161

2024-07-3000:00:00
ubuntu.com
ubuntu.com
3
linux kernel
cve-2024-42161
bpf_core_read_bitfield
gcc
switch statement
uninitialized value
security vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:
bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
[Changes from V1:

  • Use a default branch in the switch statement to initialize val'.] GCC warns that val’ may be used uninitialized in the
    BPF_CRE_READ_BITFIELD macro, defined in bpf_core_read.h as:
    […]
    unsigned long long val;
    […]
    switch (__CORE_RELO(s, field, BYTE_SIZE)) {
    case 1: val = *(const unsigned char *)p; break;
    case 2: val = *(const unsigned short *)p; break;
    case 4: val = *(const unsigned int *)p; break;
    case 8: val = *(const unsigned long long *)p; break;
    }
    […]
    val;
    }
    This patch adds a default entry in the switch statement that sets
    `val’ to zero in order to avoid the warning, and random values to be
    used in case __builtin_preserve_field_info returns unexpected values
    for BPF_FIELD_BYTE_SIZE.
    Tested in bpf-next master.
    No regressions.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

5.0%