In the Linux kernel, the following vulnerability has been resolved:
bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()
set_memory_ro() can fail, leaving memory unprotected.
Check its return and take it into account as an error.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 19 Aug 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 | |
Metrics |
threat_severity
|
threat_severity
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-01-24T16:01:24.805Z
Reserved: 2024-07-29T15:50:41.168Z
Link: CVE-2024-42068

Updated: 2024-08-02T04:54:31.888Z

Status : Modified
Published: 2024-07-29T16:15:06.387
Modified: 2025-01-24T16:15:36.613
Link: CVE-2024-42068
