Severity
5.5
Medium severity
Details
- CVSS score
- 5.5
- CVSS vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overview
About vulnerability
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Several fixes to bpf_msg_pop_data
Several fixes to bpf_msg_pop_data,
- In sk_msg_shift_left, we should put_page
- if (len == 0), return early is better
- pop the entire sk_msg (last == msg->sg.size) should be supported
- Fix for the value of variable “a”
- In sk_msg_shift_left, after shifting, i has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.
Details
- Affected product:
- AlmaLinux 9.2 ESU , Oracle Linux 7 ELS , Ubuntu 16.04 ELS , Ubuntu 18.04 ELS
- Affected packages:
- linux @ 4.15.0 (+4 more)
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Several fixes to bpf_msg_pop_data
Several fixes to bpf_msg_pop_data,
- In sk_msg_shift_left, we should put_page
- if (len == 0), return early is better
- pop the entire sk_msg (last == msg->sg.size) should be supported
- Fix for the value of variable “a”
- In sk_msg_shift_left, after shifting, i has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.