In the Linux kernel, the following vulnerability has been resolved: bpf: Fix may_goto with negative offset. Zac's syzbot crafted a bpf prog that exposed two bugs in may_goto. The 1st bug is the way may_goto is patched. When offset is negative it should be patched differently. The 2nd bug is in the verifier: when current state may_goto_depth is equal to visited state may_goto_depth it means there is an actual infinite loop. It's not correct to prune exploration of the program at this point. Note, that this check doesn't limit the program to only one may_goto insn, since 2nd and any further may_goto will increment may_goto_depth only in the queued state pushed for future exploration. The current state will have may_goto_depth == 0 regardless of number of may_goto insns and the verifier has to explore the program until bpf_exit.
History

Sat, 28 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-822

Wed, 11 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-07-29T15:52:35.598Z

Updated: 2024-09-11T17:33:57.942Z

Reserved: 2024-07-29T15:50:41.168Z

Link: CVE-2024-42072

cve-icon Vulnrichment

Updated: 2024-09-11T12:42:19.890Z

cve-icon NVD

Status : Analyzed

Published: 2024-07-29T16:15:06.693

Modified: 2024-07-30T19:01:12.833

Link: CVE-2024-42072

cve-icon Redhat

Severity : Low

Publid Date: 2024-07-29T00:00:00Z

Links: CVE-2024-42072 - Bugzilla