{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-42068","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-07-29T15:50:41.168Z","datePublished":"2024-07-29T15:52:32.538Z","dateUpdated":"2026-01-05T10:51:36.665Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-01-05T10:51:36.665Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()\n\nset_memory_ro() can fail, leaving memory unprotected.\n\nCheck its return and take it into account as an error."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/linux/filter.h","kernel/bpf/core.c","kernel/bpf/verifier.c"],"versions":[{"version":"60a3b2253c413cf601783b070507d7dd6620c954","lessThan":"a359696856ca9409fb97655c5a8ef0f549cb6e03","status":"affected","versionType":"git"},{"version":"60a3b2253c413cf601783b070507d7dd6620c954","lessThan":"e4f602e3ff749ba770bf8ff10196e18358de6720","status":"affected","versionType":"git"},{"version":"60a3b2253c413cf601783b070507d7dd6620c954","lessThan":"05412471beba313ecded95aa17b25fe84bb2551a","status":"affected","versionType":"git"},{"version":"60a3b2253c413cf601783b070507d7dd6620c954","lessThan":"7d2cc63eca0c993c99d18893214abf8f85d566d8","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["include/linux/filter.h","kernel/bpf/core.c","kernel/bpf/verifier.c"],"versions":[{"version":"3.18","status":"affected"},{"version":"0","lessThan":"3.18","status":"unaffected","versionType":"semver"},{"version":"5.15.162","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.97","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.9.8","lessThanOrEqual":"6.9.*","status":"unaffected","versionType":"semver"},{"version":"6.10","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18","versionEndExcluding":"5.15.162"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18","versionEndExcluding":"6.1.97"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18","versionEndExcluding":"6.9.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18","versionEndExcluding":"6.10"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/a359696856ca9409fb97655c5a8ef0f549cb6e03"},{"url":"https://git.kernel.org/stable/c/e4f602e3ff749ba770bf8ff10196e18358de6720"},{"url":"https://git.kernel.org/stable/c/05412471beba313ecded95aa17b25fe84bb2551a"},{"url":"https://git.kernel.org/stable/c/7d2cc63eca0c993c99d18893214abf8f85d566d8"}],"title":"bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/a359696856ca9409fb97655c5a8ef0f549cb6e03","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e4f602e3ff749ba770bf8ff10196e18358de6720","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/fdd411af8178edc6b7bf260f8fa4fba1bedd0a6d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/e3540e5a7054d6daaf9a1415a48aacb092112a89","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/05412471beba313ecded95aa17b25fe84bb2551a","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7d2cc63eca0c993c99d18893214abf8f85d566d8","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:01:05.442Z"}},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-42068","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T16:19:52.600102Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:08.404Z"}}]}}