U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-52793

Change History

New CVE Received from kernel.org 5/21/2024 12:15:17 PM

Action Type Old Value New Value
Added Description

								
							
							
						
In the Linux kernel, the following vulnerability has been resolved:

samples/bpf: syscall_tp_user: Fix array out-of-bound access

Commit 06744f24696e ("samples/bpf: Add openat2() enter/exit tracepoint
to syscall_tp sample") added two more eBPF programs to support the
openat2() syscall. However, it did not increase the size of the array
that holds the corresponding bpf_links. This leads to an out-of-bound
access on that array in the bpf_object__for_each_program loop and could
corrupt other variables on the stack. On our testing QEMU, it corrupts
the map1_fds array and causes the sample to fail:

  # ./syscall_tp
  prog #0: map ids 4 5
  verify map:4 val: 5
  map_lookup failed: Bad file descriptor

Dynamically allocate the array based on the number of programs reported
by libbpf to prevent similar inconsistencies in the future
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/61576b7a0f28f924da06bead92a39a6d9aa2404a [No types assigned]
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/9220c3ef6fefbf18f24aeedb1142a642b3de0596 [No types assigned]
Added Reference

								
							
							
						
kernel.org https://git.kernel.org/stable/c/de4825a444560f8cb78b03dda3ba873fab88bc4f [No types assigned]