Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-26883
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-17 Apr, 2024 | 10:27
Updated At-04 May, 2025 | 12:55
Rejected At-
▼CVE Numbering Authority (CNA)
bpf: Fix stackmap overflow check on 32-bit arches

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check on 32-bit arches The stackmap code relies on roundup_pow_of_two() to compute the number of hash buckets, and contains an overflow check by checking if the resulting value is 0. However, on 32-bit arches, the roundup code itself can overflow by doing a 32-bit left-shift of an unsigned long value, which is undefined behaviour, so it is not guaranteed to truncate neatly. This was triggered by syzbot on the DEVMAP_HASH type, which contains the same check, copied from the hashtab code. The commit in the fixes tag actually attempted to fix this, but the fix did not account for the UB, so the fix only works on CPUs where an overflow does result in a neat truncation to zero, which is not guaranteed. Checking the value before rounding does not have this problem.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/bpf/stackmap.c
Default Status
unaffected
Versions
Affected
  • From 063c722dd9d285d877e6fd499e753d6224f4c046 before d0e214acc59145ce25113f617311aa79dda39cb3 (git)
  • From 7e3a6b820535eb395784060ae26c5af579528fa0 before 21e5fa4688e1a4d3db6b72216231b24232f75c1d (git)
  • From 8032bf2af9ce26b3a362b9711d15f626ab946a74 before 15641007df0f0d35fa28742b25c2a7db9dcd6895 (git)
  • From 6183f4d3a0a2ad230511987c6c362ca43ec0055f before ca1f06e72dec41ae4f76e7b1a8a97265447b46ae (git)
  • From 6183f4d3a0a2ad230511987c6c362ca43ec0055f before f06899582ccee09bd85d0696290e3eaca9aa042d (git)
  • From 6183f4d3a0a2ad230511987c6c362ca43ec0055f before 7070b274c7866a4c5036f8d54fcaf315c64ac33a (git)
  • From 6183f4d3a0a2ad230511987c6c362ca43ec0055f before 43f798b9036491fb014b55dd61c4c5c3193267d0 (git)
  • From 6183f4d3a0a2ad230511987c6c362ca43ec0055f before 0971126c8164abe2004b8536b49690a0d6005b0a (git)
  • From 6183f4d3a0a2ad230511987c6c362ca43ec0055f before 7a4b21250bf79eef26543d35bd390448646c536b (git)
  • 253150830a012adfccf90afcebae8fda5b05a80f (git)
  • 766107351731ae223ebf60ca22bdfeb47ce6acc8 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • kernel/bpf/stackmap.c
Default Status
affected
Versions
Affected
  • 5.11
Unaffected
  • From 0 before 5.11 (semver)
  • From 4.19.311 through 4.19.* (semver)
  • From 5.4.273 through 5.4.* (semver)
  • From 5.10.214 through 5.10.* (semver)
  • From 5.15.153 through 5.15.* (semver)
  • From 6.1.83 through 6.1.* (semver)
  • From 6.6.23 through 6.6.* (semver)
  • From 6.7.11 through 6.7.* (semver)
  • From 6.8.2 through 6.8.* (semver)
  • From 6.9 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/d0e214acc59145ce25113f617311aa79dda39cb3
N/A
https://git.kernel.org/stable/c/21e5fa4688e1a4d3db6b72216231b24232f75c1d
N/A
https://git.kernel.org/stable/c/15641007df0f0d35fa28742b25c2a7db9dcd6895
N/A
https://git.kernel.org/stable/c/ca1f06e72dec41ae4f76e7b1a8a97265447b46ae
N/A
https://git.kernel.org/stable/c/f06899582ccee09bd85d0696290e3eaca9aa042d
N/A
https://git.kernel.org/stable/c/7070b274c7866a4c5036f8d54fcaf315c64ac33a
N/A
https://git.kernel.org/stable/c/43f798b9036491fb014b55dd61c4c5c3193267d0
N/A
https://git.kernel.org/stable/c/0971126c8164abe2004b8536b49690a0d6005b0a
N/A
https://git.kernel.org/stable/c/7a4b21250bf79eef26543d35bd390448646c536b
N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/d0e214acc59145ce25113f617311aa79dda39cb3
x_transferred
https://git.kernel.org/stable/c/21e5fa4688e1a4d3db6b72216231b24232f75c1d
x_transferred
https://git.kernel.org/stable/c/15641007df0f0d35fa28742b25c2a7db9dcd6895
x_transferred
https://git.kernel.org/stable/c/ca1f06e72dec41ae4f76e7b1a8a97265447b46ae
x_transferred
https://git.kernel.org/stable/c/f06899582ccee09bd85d0696290e3eaca9aa042d
x_transferred
https://git.kernel.org/stable/c/7070b274c7866a4c5036f8d54fcaf315c64ac33a
x_transferred
https://git.kernel.org/stable/c/43f798b9036491fb014b55dd61c4c5c3193267d0
x_transferred
https://git.kernel.org/stable/c/0971126c8164abe2004b8536b49690a0d6005b0a
x_transferred
https://git.kernel.org/stable/c/7a4b21250bf79eef26543d35bd390448646c536b
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found