First published: Mon Nov 25 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out-of-bounds access. To spot such missed invocations early in the future, checking the validity of link->type in bpf_link_show_fdinfo() and emitting a warning when such invocations are missed.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.6.62 | |
Linux Kernel | >=6.7<6.11.9 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53099 has been rated as a medium severity vulnerability.
To fix CVE-2024-53099, update your Linux kernel to version 6.1.123-1, 6.1.128-1, 6.12.12-1, or 6.12.15-1.
CVE-2024-53099 affects Linux kernel versions from 6.7 to 6.11.9 and specific release candidates in version 6.12.
CVE-2024-53099 involves an out-of-bounds access due to improper handling of a new link type in BPF.
Yes, CVE-2024-53099 is potentially exploitable, which could lead to a denial of service or code execution.