CVE-2024-49850
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/10/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos<br />
<br />
In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL<br />
referencing a non-existing BTF type, function bpf_core_calc_relo_insn<br />
would cause a null pointer deference.<br />
<br />
Fix this by adding a proper check upper in call stack, as malformed<br />
relocation records could be passed from user space.<br />
<br />
Simplest reproducer is a program:<br />
<br />
r0 = 0<br />
exit<br />
<br />
With a single relocation record:<br />
<br />
.insn_off = 0, /* patch first instruction */<br />
.type_id = 100500, /* this type id does not exist */<br />
.access_str_off = 6, /* offset of string "0" */<br />
.kind = BPF_CORE_TYPE_ID_LOCAL,<br />
<br />
See the link for original reproducer or next commit for a test case.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.17 (including) | 6.1.113 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.54 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2288b54b96dcb55bedebcef3572bb8821fc5e708
- https://git.kernel.org/stable/c/3d2786d65aaa954ebd3fcc033ada433e10da21c4
- https://git.kernel.org/stable/c/584cd3ff792e1edbea20b2a7df55897159b0be3e
- https://git.kernel.org/stable/c/dc7ce14f00bcd50641f2110b7a32aa6552e0780f
- https://git.kernel.org/stable/c/e7e9c5b2dda29067332df2a85b0141a92b41f218
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



