4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
10.0%
In the Linux kernel, the following vulnerability has been resolved:
bpf: Allow delete from sockmap/sockhash only if update is allowed
We have seen an influx of syzkaller reports where a BPF program attached to
a tracepoint triggers a locking rule violation by performing a map_delete
on a sockmap/sockhash.
We don’t intend to support this artificial use scenario. Extend the
existing verifier allowed-program-type check for updating sockmap/sockhash
to also cover deleting from a map.
From now on only BPF programs which were previously allowed to update
sockmap/sockhash can delete from these map types.
[
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "unaffected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"kernel/bpf/verifier.c"
],
"versions": [
{
"version": "dd54b48db0c8",
"lessThan": "29467edc2381",
"status": "affected",
"versionType": "git"
},
{
"version": "d1e73fb19a4c",
"lessThan": "11e8ecc5b860",
"status": "affected",
"versionType": "git"
},
{
"version": "a44770fed865",
"lessThan": "6693b172f008",
"status": "affected",
"versionType": "git"
},
{
"version": "668b3074aa14",
"lessThan": "000a65bf1dc0",
"status": "affected",
"versionType": "git"
},
{
"version": "ff9105993240",
"lessThan": "b81e1c5a3c70",
"status": "affected",
"versionType": "git"
},
{
"version": "ff9105993240",
"lessThan": "98e948fb60d4",
"status": "affected",
"versionType": "git"
}
]
},
{
"product": "Linux",
"vendor": "Linux",
"defaultStatus": "affected",
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"programFiles": [
"kernel/bpf/verifier.c"
],
"versions": [
{
"version": "6.9",
"status": "affected"
},
{
"version": "0",
"lessThan": "6.9",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.10.219",
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "5.15.161",
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.1.93",
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.6.33",
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.9.4",
"lessThanOrEqual": "6.9.*",
"status": "unaffected",
"versionType": "custom"
},
{
"version": "6.10-rc2",
"lessThanOrEqual": "*",
"status": "unaffected",
"versionType": "original_commit_for_fix"
}
]
}
]
git.kernel.org/stable/c/000a65bf1dc04fb2b65e2abf116f0bc0fc2ee7b1
git.kernel.org/stable/c/11e8ecc5b86037fec43d07b1c162e233e131b1d9
git.kernel.org/stable/c/29467edc23818dc5a33042ffb4920b49b090e63d
git.kernel.org/stable/c/6693b172f008846811f48a099f33effc26068e1e
git.kernel.org/stable/c/98e948fb60d41447fd8d2d0c3b8637fc6b6dc26d
git.kernel.org/stable/c/b81e1c5a3c70398cf76631ede63a03616ed1ba3c
4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
10.0%