In the Linux kernel, the following vulnerability has been resolved: bpf: Allow delete from sockmap/sockhash only if update is allowed We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_delete on a sockmap/sockhash. We don't intend to support this artificial use scenario. Extend the existing verifier allowed-program-type check for updating sockmap/sockhash to also cover deleting from a map. From now on only BPF programs which were previously allowed to update sockmap/sockhash can delete from these map types.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-06-21T11:15:12.202Z

Updated: 2024-08-02T04:12:26.024Z

Reserved: 2024-06-21T10:12:11.509Z

Link: CVE-2024-38662

cve-icon Vulnrichment

Updated: 2024-06-21T13:43:16.627Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-21T12:15:11.180

Modified: 2024-06-24T18:34:17.547

Link: CVE-2024-38662

cve-icon Redhat

Severity : Low

Publid Date: 2024-06-21T00:00:00Z

Links: CVE-2024-38662 - Bugzilla