Executive Summary

Informations
Name CVE-2024-49850 First vendor Publication 2024-10-21
Vendor Cve Last vendor Modification 2024-10-22

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos

In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL referencing a non-existing BTF type, function bpf_core_calc_relo_insn would cause a null pointer deference.

Fix this by adding a proper check upper in call stack, as malformed relocation records could be passed from user space.

Simplest reproducer is a program:

r0 = 0
exit

With a single relocation record:

.insn_off = 0, /* patch first instruction */
.type_id = 100500, /* this type id does not exist */
.access_str_off = 6, /* offset of string "0" */
.kind = BPF_CORE_TYPE_ID_LOCAL,

See the link for original reproducer or next commit for a test case.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49850

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-476 NULL Pointer Dereference

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3631

Sources (Detail)

https://git.kernel.org/stable/c/2288b54b96dcb55bedebcef3572bb8821fc5e708
https://git.kernel.org/stable/c/3d2786d65aaa954ebd3fcc033ada433e10da21c4
https://git.kernel.org/stable/c/584cd3ff792e1edbea20b2a7df55897159b0be3e
https://git.kernel.org/stable/c/dc7ce14f00bcd50641f2110b7a32aa6552e0780f
https://git.kernel.org/stable/c/e7e9c5b2dda29067332df2a85b0141a92b41f218
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2024-11-20 03:00:34
  • Multiple Updates
2024-11-14 03:00:50
  • Multiple Updates
2024-11-09 03:00:49
  • Multiple Updates
2024-10-26 00:28:35
  • Multiple Updates
2024-10-25 21:29:29
  • Multiple Updates
2024-10-25 00:28:33
  • Multiple Updates
2024-10-24 21:27:51
  • Multiple Updates
2024-10-24 03:04:23
  • Multiple Updates
2024-10-23 00:27:32
  • Multiple Updates
2024-10-22 21:27:36
  • Multiple Updates
2024-10-21 21:27:31
  • Multiple Updates
2024-10-21 17:27:34
  • First insertion