CVE-2024-42161

MEDIUM

Linux Kernel < 5.10.222 - Use of Uninitialized Resource

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD [Changes from V1: - Use a default branch in the switch statement to initialize `val'.] GCC warns that `val' may be used uninitialized in the BPF_CRE_READ_BITFIELD macro, defined in bpf_core_read.h as: [...] unsigned long long val; \ [...] \ switch (__CORE_RELO(s, field, BYTE_SIZE)) { \ case 1: val = *(const unsigned char *)p; break; \ case 2: val = *(const unsigned short *)p; break; \ case 4: val = *(const unsigned int *)p; break; \ case 8: val = *(const unsigned long long *)p; break; \ } \ [...] val; \ } \ This patch adds a default entry in the switch statement that sets `val' to zero in order to avoid the warning, and random values to be used in case __builtin_preserve_field_info returns unexpected values for BPF_FIELD_BYTE_SIZE. Tested in bpf-next master. No regressions.

Scores

CVSS v3 6.3
EPSS 0.0003
EPSS Percentile 6.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-908
Status published
Products (6)
linux/Kernel 5.11.0 - 5.15.163linux
linux/Kernel 5.16.0 - 6.1.98linux
linux/Kernel 5.5.0 - 5.10.222linux
linux/Kernel 6.2.0 - 6.6.39linux
linux/Kernel 6.7.0 - 6.9.9linux
linux/linux_kernel < 5.10.222
Published Jul 30, 2024
Tracked Since Feb 18, 2026