Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-35905
HistoryMay 19, 2024 - 12:00 a.m.

CVE-2024-35905

2024-05-1900:00:00
ubuntu.com
ubuntu.com
4
linux
bpf
stack access
int overflow
vulnerability

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.3%

In the Linux kernel, the following vulnerability has been resolved: bpf:
Protect against int overflow for stack access size This patch re-introduces
protection against the size of access to stack memory being negative; the
access size can appear negative as a result of overflowing its signed int
representation. This should not actually happen, as there are other
protections along the way, but we should protect against it anyway. One
code path was missing such protections (fixed in the previous patch in the
series), causing out-of-bounds array accesses in
check_stack_range_initialized(). This patch causes the verification of a
program with such a non-sensical access size to fail. This check used to
exist in a more indirect way, but was inadvertendly removed in
a833a17aeac7.

Rows per page:
1-10 of 461

References

AI Score

6.8

Confidence

High

EPSS

0

Percentile

10.3%