CVE-2024-38662

Source
https://cve.org/CVERecord?id=CVE-2024-38662
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38662.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38662
Downstream
Related
Published
2024-06-21T11:15:12.202Z
Modified
2026-03-14T12:34:40.577483Z
Summary
bpf: Allow delete from sockmap/sockhash only if update is allowed
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Allow delete from sockmap/sockhash only if update is allowed

We have seen an influx of syzkaller reports where a BPF program attached to a tracepoint triggers a locking rule violation by performing a map_delete on a sockmap/sockhash.

We don't intend to support this artificial use scenario. Extend the existing verifier allowed-program-type check for updating sockmap/sockhash to also cover deleting from a map.

From now on only BPF programs which were previously allowed to update sockmap/sockhash can delete from these map types.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38662.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
dd54b48db0c822ae7b520bc80751f0a0a173ef75
Fixed
29467edc23818dc5a33042ffb4920b49b090e63d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d1e73fb19a4c872d7a399ad3c66e8ca30e0875ec
Fixed
11e8ecc5b86037fec43d07b1c162e233e131b1d9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
a44770fed86515eedb5a7c00b787f847ebb134a5
Fixed
6693b172f008846811f48a099f33effc26068e1e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
668b3074aa14829e2ac2759799537a93b60fef86
Fixed
000a65bf1dc04fb2b65e2abf116f0bc0fc2ee7b1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ff91059932401894e6c86341915615c5eb0eca48
Fixed
b81e1c5a3c70398cf76631ede63a03616ed1ba3c
Fixed
98e948fb60d41447fd8d2d0c3b8637fc6b6dc26d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
f7990498b05ac41f7d6a190dc0418ef1d21bf058
Last affected
6af057ccdd8e7619960aca1f0428339f213b31cd

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38662.json"