๐Ÿ” CVE Alert

CVE-2024-45020

UNKNOWN 0.0

bpf: Fix a kernel verifier crash in stacksafe()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix a kernel verifier crash in stacksafe() Daniel Hodges reported a kernel verifier crash when playing with sched-ext. Further investigation shows that the crash is due to invalid memory access in stacksafe(). More specifically, it is the following code: if (exact != NOT_EXACT && old->stack[spi].slot_type[i % BPF_REG_SIZE] != cur->stack[spi].slot_type[i % BPF_REG_SIZE]) return false; The 'i' iterates old->allocated_stack. If cur->allocated_stack < old->allocated_stack the out-of-bound access will happen. To fix the issue add 'i >= cur->allocated_stack' check such that if the condition is true, stacksafe() should fail. Otherwise, cur->stack[spi].slot_type[i % BPF_REG_SIZE] memory access is legal.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
ab470fefce2837e66b771c60858118d50bb5bb10 < 7cad3174cc79519bf5f6c4441780264416822c08 2793a8b015f7f1caadb9bce9c63dc659f7522676 < 6e3987ac310c74bb4dd6a2fa8e46702fe505fb2b 2793a8b015f7f1caadb9bce9c63dc659f7522676 < bed2eb964c70b780fb55925892a74f26cb590b25
Linux / Linux
6.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7cad3174cc79519bf5f6c4441780264416822c08 git.kernel.org: https://git.kernel.org/stable/c/6e3987ac310c74bb4dd6a2fa8e46702fe505fb2b git.kernel.org: https://git.kernel.org/stable/c/bed2eb964c70b780fb55925892a74f26cb590b25