CVE-2024-26884

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix hashtab overflow check on 32-bit arches The hashtab code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. However, on 32-bit arches, the roundup code itself can overflow by doing a 32-bit left-shift of an unsigned long value, which is undefined behaviour, so it is not guaranteed to truncate neatly. This was triggered by syzbot on the DEVMAP_HASH type, which contains the same check, copied from the hashtab code. So apply the same fix to hashtab, by moving the overflow check to before the roundup.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

30 Oct 2024, 20:35

Type Values Removed Values Added
CWE CWE-190

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

29 Apr 2024, 20:03

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: corrige la comprobación de desbordamiento de hashtab en arcos de 32 bits. El código hashtab se basa en roundup_pow_of_two() para calcular el número de depósitos de hash y contiene una comprobación de desbordamiento comprobando si el valor resultante es 0. Sin embargo, en arcos de 32 bits, el código de resumen en sí puede desbordarse al realizar un desplazamiento hacia la izquierda de 32 bits de un valor largo sin signo, lo cual es un comportamiento indefinido, por lo que no se garantiza que se trunque claramente. Esto fue activado por syzbot en el tipo DEVMAP_HASH, que contiene la misma verificación, copiada del código hashtab. Así que aplique la misma solución a hashtab, moviendo la verificación de desbordamiento antes del resumen.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 - () https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5 - Patch
References () https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d - () https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d - Patch
References () https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 - () https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6 - Patch
References () https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 - () https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1 - Patch
References () https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 - () https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868 - Patch
References () https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace - () https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace - Patch
References () https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 - () https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016 - Patch
References () https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 - () https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93 - Patch
References () https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e - () https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-119

17 Apr 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 11:15

Updated : 2024-11-05 10:15


NVD link : CVE-2024-26884

Mitre link : CVE-2024-26884

CVE.ORG link : CVE-2024-26884


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-190

Integer Overflow or Wraparound