CVE-2024-53099

Source
https://cve.org/CVERecord?id=CVE-2024-53099
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53099.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53099
Downstream
Related
Published
2024-11-25T21:21:27.691Z
Modified
2026-03-20T12:40:43.543501Z
Summary
bpf: Check validity of link->type in bpf_link_show_fdinfo()
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Check validity of link->type in bpflinkshow_fdinfo()

If a newly-added link type doesn't invoke BPFLINKTYPE(), accessing bpflinktype_strs[link->type] may result in an out-of-bounds access.

To spot such missed invocations early in the future, checking the validity of link->type in bpflinkshow_fdinfo() and emitting a warning when such invocations are missed.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53099.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
70ed506c3bbcfa846d4636b23051ca79fa4781f7
Fixed
79f87a6ec39fb5968049a6775a528bf58b25c20a
Fixed
24fec234d2ba9ca3c14e545ebe3fd6dcb47f074d
Fixed
4e8074bb33d18f56af30a0252cb3606d27eb1c13
Fixed
d5092b0a1aaf35d77ebd8d33384d7930bec5cb5d
Fixed
b3eb1b6a9f745d6941b345f0fae014dc8bb06d36
Fixed
8421d4c8762bd022cb491f2f0f7019ef51b4f0a7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53099.json"