CVE-2024-50163
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/11/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Make sure internal and UAPI bpf_redirect flags don&#39;t overlap<br />
<br />
The bpf_redirect_info is shared between the SKB and XDP redirect paths,<br />
and the two paths use the same numeric flag values in the ri->flags<br />
field (specifically, BPF_F_BROADCAST == BPF_F_NEXTHOP). This means that<br />
if skb bpf_redirect_neigh() is used with a non-NULL params argument and,<br />
subsequently, an XDP redirect is performed using the same<br />
bpf_redirect_info struct, the XDP path will get confused and end up<br />
crashing, which syzbot managed to trigger.<br />
<br />
With the stack-allocated bpf_redirect_info, the structure is no longer<br />
shared between the SKB and XDP paths, so the crash doesn&#39;t happen<br />
anymore. However, different code paths using identically-numbered flag<br />
values in the same struct field still seems like a bit of a mess, so<br />
this patch cleans that up by moving the flag definitions together and<br />
redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap<br />
with the flags used for XDP. It also adds a BUILD_BUG_ON() check to make<br />
sure the overlap is not re-introduced by mistake.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.170 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.115 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.59 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.11.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09d88791c7cd888d5195c84733caf9183dcfbd16
- https://git.kernel.org/stable/c/0fca5ed4be8e8bfbfb9bd97845af596bab7192d3
- https://git.kernel.org/stable/c/314dbee9fe4f5cee36435465de52c988d7caa466
- https://git.kernel.org/stable/c/4e1e428533845d48828bd3875c0e92e8565b9962
- https://git.kernel.org/stable/c/cec288e05ceac9a0d3a3a1fd279534b11844c826
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



