Lucene search

K
cveLinuxCVE-2024-42067
HistoryJul 29, 2024 - 4:15 p.m.

CVE-2024-42067

2024-07-2916:15:06
CWE-252
Linux
web.nvd.nist.gov
36
linux kernel
bpf
vulnerability

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

5.0%

In the Linux kernel, the following vulnerability has been resolved:

bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()

set_memory_rox() can fail, leaving memory unprotected.

Check return and bail out when bpf_jit_binary_lock_ro() returns
an error.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange<6.6.37
OR
linuxlinux_kernelRange6.76.9.8
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "arch/arm/net/bpf_jit_32.c",
      "arch/loongarch/net/bpf_jit.c",
      "arch/mips/net/bpf_jit_comp.c",
      "arch/parisc/net/bpf_jit_core.c",
      "arch/s390/net/bpf_jit_comp.c",
      "arch/sparc/net/bpf_jit_comp_64.c",
      "arch/x86/net/bpf_jit_comp32.c",
      "include/linux/filter.h"
    ],
    "versions": [
      {
        "version": "1da177e4c3f4",
        "lessThan": "08f6c05feb1d",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "1da177e4c3f4",
        "lessThan": "9fef36cad60d",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "1da177e4c3f4",
        "lessThan": "044da7ae7afd",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "1da177e4c3f4",
        "lessThan": "e60adf513275",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "arch/arm/net/bpf_jit_32.c",
      "arch/loongarch/net/bpf_jit.c",
      "arch/mips/net/bpf_jit_comp.c",
      "arch/parisc/net/bpf_jit_core.c",
      "arch/s390/net/bpf_jit_comp.c",
      "arch/sparc/net/bpf_jit_comp_64.c",
      "arch/x86/net/bpf_jit_comp32.c",
      "include/linux/filter.h"
    ],
    "versions": [
      {
        "version": "6.6.37",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.38",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9.8",
        "lessThanOrEqual": "6.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.10",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

5.0%