CVE-2024-38574

In the Linux kernel, the following vulnerability has been resolved: libbpf: Prevent null-pointer dereference when prog to load has no BTF In bpf_objec_load_prog(), there's no guarantee that obj->btf is non-NULL when passing it to btf__fd(), and this function does not perform any check before dereferencing its argument (as bpf_object__btf_fd() used to do). As a consequence, we get segmentation fault errors in bpftool (for example) when trying to load programs that come without BTF information. v2: Keep btf__fd() in the fix instead of reverting to bpf_object__btf_fd().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Jan 2025, 15:18

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0 - () https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0 - Patch
References () https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb - () https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb - Patch
References () https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104 - () https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104 - Patch
CWE CWE-476

21 Nov 2024, 09:26

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0 - () https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0 -
References () https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb - () https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb -
References () https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104 - () https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104 -

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: libbpf: evita la desreferencia del puntero nulo cuando el programa a cargar no tiene BTF. En bpf_objec_load_prog(), no hay garantía de que obj->btf no sea NULL al pasarlo a btf__fd() , y esta función no realiza ninguna verificación antes de eliminar la referencia a su argumento (como solía hacer bpf_object__btf_fd()). Como consecuencia, obtenemos errores de segmentación en bpftool (por ejemplo) cuando intentamos cargar programas que vienen sin información BTF. v2: Mantenga btf__fd() en la solución en lugar de volver a bpf_object__btf_fd().

19 Jun 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-19 14:15

Updated : 2025-01-31 15:18


NVD link : CVE-2024-38574

Mitre link : CVE-2024-38574

CVE.ORG link : CVE-2024-38574


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference