Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Check validity of link->type in bpf_link_show_fdinfo() If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing bpf_link_type_strs[link->type] may result in an out-of-bounds access. To spot such missed invocations early in the future, checking the validity of link->type in bpf_link_show_fdinfo() and emitting a warning when such invocations are missed.
References (8)
Core 8
Core References
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
0.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (7)
linux/Kernel
5.11.0 - 5.15.176linux
linux/Kernel
5.16.0 - 6.1.123linux
linux/Kernel
5.7.0 - 5.10.233linux
linux/Kernel
6.2.0 - 6.6.62linux
linux/Kernel
6.7.0 - 6.11.9linux
linux/linux_kernel
6.12 rc1 (4 CPE variants)
linux/linux_kernel
< 6.6.62
Published
Nov 25, 2024
Tracked Since
Feb 18, 2026