Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-52793
HistoryMay 21, 2024 - 4:15 p.m.

CVE-2023-52793

2024-05-2116:15:17
Debian Security Bug Tracker
security-tracker.debian.org
1
linux kernel
vulnerability
cve-2023-52793
samples/bpf
syscall_tp_user
array out-of-bound access
ebpf programs
openat2() syscall
qemu

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

In the Linux kernel, the following vulnerability has been resolved: samples/bpf: syscall_tp_user: Fix array out-of-bound access Commit 06744f24696e (“samples/bpf: Add openat2() enter/exit tracepoint to syscall_tp sample”) added two more eBPF programs to support the openat2() syscall. However, it did not increase the size of the array that holds the corresponding bpf_links. This leads to an out-of-bound access on that array in the bpf_object__for_each_program loop and could corrupt other variables on the stack. On our testing QEMU, it corrupts the map1_fds array and causes the sample to fail: # ./syscall_tp prog #0: map ids 4 5 verify map:4 val: 5 map_lookup failed: Bad file descriptor Dynamically allocate the array based on the number of programs reported by libbpf to prevent similar inconsistencies in the future

6.6 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for DEBIANCVE:CVE-2023-52793