CVE-2024-38574

In the Linux kernel, the following vulnerability has been resolved: libbpf: Prevent null-pointer dereference when prog to load has no BTF In bpf_objec_load_prog(), there's no guarantee that obj->btf is non-NULL when passing it to btf__fd(), and this function does not perform any check before dereferencing its argument (as bpf_object__btf_fd() used to do). As a consequence, we get segmentation fault errors in bpftool (for example) when trying to load programs that come without BTF information. v2: Keep btf__fd() in the fix instead of reverting to bpf_object__btf_fd().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

31 Jan 2025, 15:18

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0 - () https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0 - Patch
References () https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb - () https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb - Patch
References () https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104 - () https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104 - Patch
CWE CWE-476
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

Information

Published : 2024-06-19 14:15

Updated : 2025-01-31 15:18


NVD link : CVE-2024-38574

Mitre link : CVE-2024-38574

CVE.ORG link : CVE-2024-38574


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference