CVE-2024-53099

Updated: 2025-01-14 17:56:06.658606

Description:

In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out-of-bounds access. To spot such missed invocations early in the future, checking the validity of link->type in bpf_link_show_fdinfo() and emitting a warning when such invocations are missed.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.1

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.1 HIGH Needs Triage 2025-01-14 13:46:49
AlmaLinux 9.2 FIPS kernel 5.14.0 7.1 HIGH In Testing 2025-01-24 11:41:26
CentOS 6 ELS kernel 2.6.32 7.1 HIGH Not Vulnerable 2025-01-28 02:26:47
CentOS 7 ELS kernel 3.10.0 7.1 HIGH Not Vulnerable 2025-01-31 04:30:41
CentOS 8.4 ELS kernel 4.18.0 7.1 HIGH Released CLSA-2025:1739525834 2025-02-14 23:54:22
CentOS 8.5 ELS kernel 4.18.0 7.1 HIGH Released CLSA-2025:1739525795 2025-02-14 23:54:23
CentOS Stream 8 ELS kernel 4.18.0 7.1 HIGH In Testing 2025-02-10 06:33:45
CloudLinux 6 ELS kernel 2.6.32 7.1 HIGH Not Vulnerable 2025-01-28 02:26:47
CloudLinux 7 ELS kernel 3.10.0 7.1 HIGH Not Vulnerable 2025-01-31 04:30:41
Oracle Linux 6 ELS kernel 2.6.32 7.1 HIGH Not Vulnerable 2025-01-28 02:26:46
Total: 14