CVE-2024-50123
📋 TL;DR
This CVE describes an out-of-bounds read vulnerability in the Linux kernel's BPF subsystem specifically affecting sockmap link file descriptor information display. Attackers could potentially read kernel memory beyond intended boundaries, potentially exposing sensitive information or causing system instability. This affects systems running vulnerable Linux kernel versions with BPF sockmap functionality enabled.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel memory disclosure leading to information leakage, potential privilege escalation if combined with other vulnerabilities, or kernel panic causing denial of service.
Likely Case
Information disclosure of kernel memory contents, potentially exposing sensitive data structures or pointers that could aid further exploitation.
If Mitigated
Limited impact with proper kernel hardening, SELinux/AppArmor, and BPF restrictions in place.
🎯 Exploit Status
Exploitation requires ability to create BPF sockmap links and access to the affected fdinfo functionality. Likely requires local access or ability to execute BPF programs.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 6d79f12c0ce2bc8ff5f109093df1734bd6450615 and c2f803052bc7a7feb2e03befccc8e49b6ff1f5f5
Vendor Advisory: https://git.kernel.org/stable/c/6d79f12c0ce2bc8ff5f109093df1734bd6450615
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable BPF sockmap functionality
linuxPrevent creation of sockmap BPF links by disabling or restricting BPF functionality
sysctl -w kernel.unprivileged_bpf_disabled=1
echo 1 > /proc/sys/kernel/unprivileged_bpf_disabled
🧯 If You Can't Patch
- Restrict BPF functionality to privileged users only
- Implement strict access controls to prevent unauthorized users from creating BPF programs
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if BPF sockmap is enabled. Examine /proc/sys/kernel/unprivileged_bpf_disabled setting.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits: 'uname -r' and check with distribution's security advisories.
📡 Detection & Monitoring
Log Indicators:
- Kernel oops messages
- BPF program creation logs
- Unexpected fdinfo access patterns
Network Indicators:
- None - local vulnerability only
SIEM Query:
Search for kernel panic events or BPF program creation by non-privileged users