In the Linux kernel, the following vulnerability has been resolved:
libbpf: Use OPTS_SET() macro in bpf_xdp_query()
When the feature_flags and xdp_zc_max_segs fields were added to the libbpf
bpf_xdp_query_opts, the code writing them did not use the OPTS_SET() macro.
This causes libbpf to write to those fields unconditionally, which means
that programs compiled against an older version of libbpf (with a smaller
size of the bpf_xdp_query_opts struct) will have its stack corrupted by
libbpf writing out of bounds.
The patch adding the feature_flags field has an early bail out if the
feature_flags field is not part of the opts struct (via the OPTS_HAS)
macro, but the patch adding xdp_zc_max_segs does not. For consistency, this
fix just changes the assignments to both fields to use the OPTS_SET()
macro.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Apr 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Wed, 05 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux acrn
|
|
CPEs | cpe:2.3:o:linux:acrn:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Linux acrn
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-02-05T20:58:16.092Z
Reserved: 2024-02-19T14:20:24.213Z
Link: CVE-2024-27050

Updated: 2024-08-02T00:21:05.913Z

Status : Analyzed
Published: 2024-05-01T13:15:50.070
Modified: 2025-04-08T18:38:39.097
Link: CVE-2024-27050
