跳转到帖子

Red Hat: CVE-2023-52462: kernel: bpf: fix check for attempt to corrupt spilled pointer (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2023-52462: kernel: bpf: fix check for attempt to corrupt spilled pointer (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:L/Au:M/C:N/I:C/A:N)
Published
02/23/2024
Created
12/06/2024
Added
12/05/2024
Modified
12/05/2024

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: fix check for attempt to corrupt spilled pointer When register is spilled onto a stack as a 1/2/4-byte register, we set slot_type[BPF_REG_SIZE - 1] (plus potentially few more below it, depending on actual spill size). So to check if some stack slot has spilled register we need to consult slot_type[7], not slot_type[0]. To avoid the need to remember and double-check this in the future, just use is_spilled_reg() helper.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-rt

References

  • CVE-2023-52462
  • RHSA-2024:9315
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…