๐Ÿ” CVE Alert

CVE-2024-56720

MEDIUM 5.5

bpf, sockmap: Several fixes to bpf_msg_pop_data

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Several fixes to bpf_msg_pop_data Several fixes to bpf_msg_pop_data, 1. In sk_msg_shift_left, we should put_page 2. if (len == 0), return early is better 3. pop the entire sk_msg (last == msg->sg.size) should be supported 4. Fix for the value of variable "a" 5. In sk_msg_shift_left, after shifting, i has already pointed to the next element. Addtional sk_msg_iter_var_next may result in BUG.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 29, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new medium vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < d3f5763b3062514a234114e97bbde74d8d702449 7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < d26d977633d1d0b8bf9407278189bd0a8d973323 7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < e1f54c61c4c9a5244eb8159dce60d248f7d97b32 7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < f58d3aa457e77a3d9b3df2ab081dcf9950f6029f 7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < 98c7ea7d11f2588e8197db042e0291e4ac8f8346 7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < 785180bed9879680d8e5c5e1b54c8ae8d948f4c8 7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < 275a9f3ef8fabb0cb282a62b9e164dedba7284c5 7246d8ed4dcce23f7509949a77be15fa9f0e3d28 < 5d609ba262475db450ba69b8e8a557bd768ac07a
Linux / Linux
5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d3f5763b3062514a234114e97bbde74d8d702449 git.kernel.org: https://git.kernel.org/stable/c/d26d977633d1d0b8bf9407278189bd0a8d973323 git.kernel.org: https://git.kernel.org/stable/c/e1f54c61c4c9a5244eb8159dce60d248f7d97b32 git.kernel.org: https://git.kernel.org/stable/c/f58d3aa457e77a3d9b3df2ab081dcf9950f6029f git.kernel.org: https://git.kernel.org/stable/c/98c7ea7d11f2588e8197db042e0291e4ac8f8346 git.kernel.org: https://git.kernel.org/stable/c/785180bed9879680d8e5c5e1b54c8ae8d948f4c8 git.kernel.org: https://git.kernel.org/stable/c/275a9f3ef8fabb0cb282a62b9e164dedba7284c5 git.kernel.org: https://git.kernel.org/stable/c/5d609ba262475db450ba69b8e8a557bd768ac07a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html