CVE-2024-53125

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/12/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: sync_linked_regs() must preserve subreg_def<br /> <br /> Range propagation must not affect subreg_def marks, otherwise the<br /> following example is rewritten by verifier incorrectly when<br /> BPF_F_TEST_RND_HI32 flag is set:<br /> <br /> 0: call bpf_ktime_get_ns call bpf_ktime_get_ns<br /> 1: r0 &amp;= 0x7fffffff after verifier r0 &amp;= 0x7fffffff<br /> 2: w1 = w0 rewrites w1 = w0<br /> 3: if w0 r11 = 0x2f5674a6 (r)<br /> 4: r1 &gt;&gt;= 32 r11

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.10 (including) 5.10.232 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.175 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.121 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.67 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.11.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*