CVE-2024-50163

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/11/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Make sure internal and UAPI bpf_redirect flags don&amp;#39;t overlap<br /> <br /> The bpf_redirect_info is shared between the SKB and XDP redirect paths,<br /> and the two paths use the same numeric flag values in the ri-&gt;flags<br /> field (specifically, BPF_F_BROADCAST == BPF_F_NEXTHOP). This means that<br /> if skb bpf_redirect_neigh() is used with a non-NULL params argument and,<br /> subsequently, an XDP redirect is performed using the same<br /> bpf_redirect_info struct, the XDP path will get confused and end up<br /> crashing, which syzbot managed to trigger.<br /> <br /> With the stack-allocated bpf_redirect_info, the structure is no longer<br /> shared between the SKB and XDP paths, so the crash doesn&amp;#39;t happen<br /> anymore. However, different code paths using identically-numbered flag<br /> values in the same struct field still seems like a bit of a mess, so<br /> this patch cleans that up by moving the flag definitions together and<br /> redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap<br /> with the flags used for XDP. It also adds a BUILD_BUG_ON() check to make<br /> sure the overlap is not re-introduced by mistake.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.14 (including) 5.15.170 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.115 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.59 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.11.6 (excluding)
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*