In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself
sock_map proto callbacks should never call themselves by design. Protect
against bugs like [1] and break out of the recursive loop to avoid a stack
overflow in favor of a resource leak.
[1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
Metrics
Affected Vendors & Products
References
History
Sat, 14 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Mon, 26 Aug 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat rhel Eus |
|
CPEs | cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.2::nfv |
|
Vendors & Products |
Redhat
Redhat rhel Eus |
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-05-21T15:22:59.893Z
Updated: 2024-12-19T08:24:40.295Z
Reserved: 2024-05-21T15:19:24.232Z
Link: CVE-2023-52735
Vulnrichment
Updated: 2024-08-02T23:11:35.223Z
NVD
Status : Awaiting Analysis
Published: 2024-05-21T16:15:13.523
Modified: 2024-11-21T08:40:28.437
Link: CVE-2023-52735
Redhat