SB20241230107 - Out-of-bounds read in Linux kernel bpf
Published: December 30, 2024 Updated: May 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2024-56615)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dev_map_alloc(), dev_map_delete_elem() and dev_map_hash_delete_elem() functions in kernel/bpf/devmap.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0f170e91d3063ca60baec4bd9f544faf3bfe29eb
- https://git.kernel.org/stable/c/178e31df1fb3d9e0890eb471da16709cbc82edee
- https://git.kernel.org/stable/c/70f3de869865f9c3da0508a5ea29f6f4c1889057
- https://git.kernel.org/stable/c/8e858930695d3ebec423e85384c95427258c294f
- https://git.kernel.org/stable/c/98c03d05936d846073df8f550e9e8bf0dde1d77f
- https://git.kernel.org/stable/c/ab244dd7cf4c291f82faacdc50b45cc0f55b674d
- https://git.kernel.org/stable/c/ad34306ac6836e5dd096b7d0ad4aa20cb7c8d9e5
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.174