CVE-2024-47728
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error<br />
<br />
For all non-tracing helpers which formerly had ARG_PTR_TO_{LONG,INT} as input<br />
arguments, zero the value for the case of an error as otherwise it could leak<br />
memory. For tracing, it is not needed given CAP_PERFMON can already read all<br />
kernel memory anyway hence bpf_get_func_arg() and bpf_get_func_ret() is skipped<br />
in here.<br />
<br />
Also, the MTU helpers mtu_len pointer value is being written but also read.<br />
Technically, the MEM_UNINIT should not be there in order to always force init.<br />
Removing MEM_UNINIT needs more verifier rework though: MEM_UNINIT right now<br />
implies two things actually: i) write into memory, ii) memory does not have<br />
to be initialized. If we lift MEM_UNINIT, it then becomes: i) read into memory,<br />
ii) memory must be initialized. This means that for bpf_*_check_mtu() we&#39;re<br />
readding the issue we&#39;re trying to fix, that is, it would then be able to<br />
write back into things like .rodata BPF maps. Follow-up work will rework the<br />
MEM_UNINIT semantics such that the intent can be better expressed. For now<br />
just clear the *mtu_len on error path which can be lifted later again.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.2 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4b3786a6c5397dc220b1483d8e2f4867743e966f
- https://git.kernel.org/stable/c/594a9f5a8d2de2573a856e506f77ba7dd2cefc6a
- https://git.kernel.org/stable/c/599d15b6d03356a97bff7a76155c5604c42a2962
- https://git.kernel.org/stable/c/8397bf78988f3ae9dbebb0200189a62a57264980
- https://git.kernel.org/stable/c/a634fa8e480ac2423f86311a602f6295df2c8ed0
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



