{"uuid": "2dbe7c33-dbf7-4942-8bdb-e541ad4b9f4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50164", "type": "seen", "source": "https://t.me/cvedetector/10080", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50164 - Linux Kernel BPF Raw Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50164 \nPublished : Nov. 7, 2024, 10:15 a.m. | 34\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nbpf: Fix overloading of MEM_UNINIT's meaning  \n  \nLonial reported an issue in the BPF verifier where check_mem_size_reg()  \nhas the following code:  \n  \n    if (!tnum_is_const(reg-&gt;var_off))  \n        /* For unprivileged variable accesses, disable raw  \n         * mode so that the program is required to  \n         * initialize all the memory that the helper could  \n         * just partially fill up.  \n         */  \n         meta = NULL;  \n  \nThis means that writes are not checked when the register containing the  \nsize of the passed buffer has not a fixed size. Through this bug, a BPF  \nprogram can write to a map which is marked as read-only, for example,  \n.rodata global maps.  \n  \nThe problem is that MEM_UNINIT's initial meaning that \"the passed buffer  \nto the BPF helper does not need to be initialized\" which was added back  \nin commit 435faee1aae9 (\"bpf, verifier: add ARG_PTR_TO_RAW_STACK type\")  \ngot overloaded over time with \"the passed buffer is being written to\".  \n  \nThe problem however is that checks such as the above which were added later  \nvia 06c1c049721a (\"bpf: allow helpers access to variable memory\") set meta  \nto NULL in order force the user to always initialize the passed buffer to  \nthe helper. Due to the current double meaning of MEM_UNINIT, this bypasses  \nverifier write checks to the memory (not boundary checks though) and only  \nassumes the latter memory is read instead.  \n  \nFix this by reverting MEM_UNINIT back to its original meaning, and having  \nMEM_WRITE as an annotation to BPF helpers in order to then trigger the  \nBPF verifier checks for writing to memory.  \n  \nSome notes: check_arg_pair_ok() ensures that for ARG_CONST_SIZE{,_OR_ZERO}  \nwe can access fn-&gt;arg_type[arg - 1] since it must contain a preceding  \nARG_PTR_TO_MEM. For check_mem_reg() the meta argument can be removed  \naltogether since we do check both BPF_READ and BPF_WRITE. Same for the  \nequivalent check_kfunc_mem_size_reg(). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-07T11:54:39.000000Z"}