CVE-2024-38574
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
19/06/2024
Last modified:
31/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
libbpf: Prevent null-pointer dereference when prog to load has no BTF<br />
<br />
In bpf_objec_load_prog(), there&#39;s no guarantee that obj->btf is non-NULL<br />
when passing it to btf__fd(), and this function does not perform any<br />
check before dereferencing its argument (as bpf_object__btf_fd() used to<br />
do). As a consequence, we get segmentation fault errors in bpftool (for<br />
example) when trying to load programs that come without BTF information.<br />
<br />
v2: Keep btf__fd() in the fix instead of reverting to bpf_object__btf_fd().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.8.12 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0
- https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb
- https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104
- https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0
- https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb
- https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104