CVE-2024-56720

Updated on 29 Dec 2024

Severity

5.5 Medium severity

Details

CVSS score
5.5
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Overview

About vulnerability

In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Several fixes to bpf_msg_pop_data

Several fixes to bpf_msg_pop_data,

  1. In sk_msg_shift_left, we should put_page
  2. if (len == 0), return early is better
  3. pop the entire sk_msg (last == msg->sg.size) should be supported
  4. Fix for the value of variable “a”
  5. In sk_msg_shift_left, after shifting, i has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.

Details

Affected packages:
linux @ 4.15.0 (+4 more)

In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Several fixes to bpf_msg_pop_data

Several fixes to bpf_msg_pop_data,

  1. In sk_msg_shift_left, we should put_page
  2. if (len == 0), return early is better
  3. pop the entire sk_msg (last == msg->sg.size) should be supported
  4. Fix for the value of variable “a”
  5. In sk_msg_shift_left, after shifting, i has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.

Fixes