Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-50163
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-07 Nov, 2024 | 09:31
Updated At-03 Nov, 2025 | 22:26
Rejected At-
▼CVE Numbering Authority (CNA)
bpf: Make sure internal and UAPI bpf_redirect flags don't overlap

In the Linux kernel, the following vulnerability has been resolved: bpf: Make sure internal and UAPI bpf_redirect flags don't overlap The bpf_redirect_info is shared between the SKB and XDP redirect paths, and the two paths use the same numeric flag values in the ri->flags field (specifically, BPF_F_BROADCAST == BPF_F_NEXTHOP). This means that if skb bpf_redirect_neigh() is used with a non-NULL params argument and, subsequently, an XDP redirect is performed using the same bpf_redirect_info struct, the XDP path will get confused and end up crashing, which syzbot managed to trigger. With the stack-allocated bpf_redirect_info, the structure is no longer shared between the SKB and XDP paths, so the crash doesn't happen anymore. However, different code paths using identically-numbered flag values in the same struct field still seems like a bit of a mess, so this patch cleans that up by moving the flag definitions together and redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap with the flags used for XDP. It also adds a BUILD_BUG_ON() check to make sure the overlap is not re-introduced by mistake.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • include/uapi/linux/bpf.h
  • net/core/filter.c
Default Status
unaffected
Versions
Affected
  • From e624d4ed4aa8cc3c69d1359b0aaea539203ed266 before 4e1e428533845d48828bd3875c0e92e8565b9962 (git)
  • From e624d4ed4aa8cc3c69d1359b0aaea539203ed266 before 314dbee9fe4f5cee36435465de52c988d7caa466 (git)
  • From e624d4ed4aa8cc3c69d1359b0aaea539203ed266 before 0fca5ed4be8e8bfbfb9bd97845af596bab7192d3 (git)
  • From e624d4ed4aa8cc3c69d1359b0aaea539203ed266 before cec288e05ceac9a0d3a3a1fd279534b11844c826 (git)
  • From e624d4ed4aa8cc3c69d1359b0aaea539203ed266 before 09d88791c7cd888d5195c84733caf9183dcfbd16 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • include/uapi/linux/bpf.h
  • net/core/filter.c
Default Status
affected
Versions
Affected
  • 5.14
Unaffected
  • From 0 before 5.14 (semver)
  • From 5.15.170 through 5.15.* (semver)
  • From 6.1.115 through 6.1.* (semver)
  • From 6.6.59 through 6.6.* (semver)
  • From 6.11.6 through 6.11.* (semver)
  • From 6.12 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/4e1e428533845d48828bd3875c0e92e8565b9962
N/A
https://git.kernel.org/stable/c/314dbee9fe4f5cee36435465de52c988d7caa466
N/A
https://git.kernel.org/stable/c/0fca5ed4be8e8bfbfb9bd97845af596bab7192d3
N/A
https://git.kernel.org/stable/c/cec288e05ceac9a0d3a3a1fd279534b11844c826
N/A
https://git.kernel.org/stable/c/09d88791c7cd888d5195c84733caf9183dcfbd16
N/A
Hyperlink: https://git.kernel.org/stable/c/4e1e428533845d48828bd3875c0e92e8565b9962
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/314dbee9fe4f5cee36435465de52c988d7caa466
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0fca5ed4be8e8bfbfb9bd97845af596bab7192d3
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cec288e05ceac9a0d3a3a1fd279534b11844c826
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/09d88791c7cd888d5195c84733caf9183dcfbd16
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-noinfoCWE-noinfo Not enough information
Type: CWE
CWE ID: CWE-noinfo
Description: CWE-noinfo Not enough information
Metrics
VersionBase scoreBase severityVector
3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html
Resource: N/A
Details not found