CVE-2024-42067

In the Linux kernel, the following vulnerability has been resolved: bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() set_memory_rox() can fail, leaving memory unprotected. Check return and bail out when bpf_jit_binary_lock_ro() returns an error.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

30 Jul 2024, 19:02

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: bpf: Tener en cuenta el retorno de set_memory_rox() con bpf_jit_binary_lock_ro() set_memory_rox() puede fallar, dejando la memoria desprotegida. Verifique la devolución y el rescate cuando bpf_jit_binary_lock_ro() devuelva un error.
CWE CWE-252
References () https://git.kernel.org/stable/c/044da7ae7afd4ef60806d73654a2e6a79aa4ed7a - () https://git.kernel.org/stable/c/044da7ae7afd4ef60806d73654a2e6a79aa4ed7a - Patch
References () https://git.kernel.org/stable/c/08f6c05feb1db21653e98ca84ea04ca032d014c7 - () https://git.kernel.org/stable/c/08f6c05feb1db21653e98ca84ea04ca032d014c7 - Patch
References () https://git.kernel.org/stable/c/9fef36cad60d4226f9d06953cd56d1d2f9119730 - () https://git.kernel.org/stable/c/9fef36cad60d4226f9d06953cd56d1d2f9119730 - Patch
References () https://git.kernel.org/stable/c/e60adf513275c3a38e5cb67f7fd12387e43a3ff5 - () https://git.kernel.org/stable/c/e60adf513275c3a38e5cb67f7fd12387e43a3ff5 - Patch

29 Jul 2024, 16:21

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 16:15

Updated : 2024-07-30 19:02


NVD link : CVE-2024-42067

Mitre link : CVE-2024-42067

CVE.ORG link : CVE-2024-42067


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-252

Unchecked Return Value