{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-50262","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-10-21T19:36:19.981Z","datePublished":"2024-11-09T10:17:50.461Z","dateUpdated":"2025-11-03T22:27:42.104Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:50:11.629Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds write in trie_get_next_key()\n\ntrie_get_next_key() allocates a node stack with size trie->max_prefixlen,\nwhile it writes (trie->max_prefixlen + 1) nodes to the stack when it has\nfull paths from the root to leaves. For example, consider a trie with\nmax_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ...\n0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with\n.prefixlen = 8 make 9 nodes be written on the node stack with size 8."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/lpm_trie.c"],"versions":[{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"e8494ac079814a53fbc2258d2743e720907488ed","status":"affected","versionType":"git"},{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"91afbc0eb3c90258ae378ae3c6ead3d2371e926d","status":"affected","versionType":"git"},{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"590976f921723d53ac199c01d5b7b73a94875e68","status":"affected","versionType":"git"},{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"86c8ebe02d8806dd8878d0063e8e185622ab6ea6","status":"affected","versionType":"git"},{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"a035df0b98df424559fd383e8e1a268f422ea2ba","status":"affected","versionType":"git"},{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"90a6e0e1e151ef7a9282e78f54c3091de2dcc99c","status":"affected","versionType":"git"},{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"c4b4f9a9ab82238cb158fa4fe61a8c0ae21a4980","status":"affected","versionType":"git"},{"version":"b471f2f1de8b816f1e799b80aa92588f3566e4bd","lessThan":"13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["kernel/bpf/lpm_trie.c"],"versions":[{"version":"4.16","status":"affected"},{"version":"0","lessThan":"4.16","status":"unaffected","versionType":"semver"},{"version":"4.19.323","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.285","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.229","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.171","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.116","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.60","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.11.7","lessThanOrEqual":"6.11.*","status":"unaffected","versionType":"semver"},{"version":"6.12","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"4.19.323"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"5.4.285"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"5.10.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"5.15.171"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.1.116"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.6.60"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.11.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.12"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/e8494ac079814a53fbc2258d2743e720907488ed"},{"url":"https://git.kernel.org/stable/c/91afbc0eb3c90258ae378ae3c6ead3d2371e926d"},{"url":"https://git.kernel.org/stable/c/590976f921723d53ac199c01d5b7b73a94875e68"},{"url":"https://git.kernel.org/stable/c/86c8ebe02d8806dd8878d0063e8e185622ab6ea6"},{"url":"https://git.kernel.org/stable/c/a035df0b98df424559fd383e8e1a268f422ea2ba"},{"url":"https://git.kernel.org/stable/c/90a6e0e1e151ef7a9282e78f54c3091de2dcc99c"},{"url":"https://git.kernel.org/stable/c/c4b4f9a9ab82238cb158fa4fe61a8c0ae21a4980"},{"url":"https://git.kernel.org/stable/c/13400ac8fb80c57c2bfb12ebd35ee121ce9b4d21"}],"title":"bpf: Fix out-of-bounds write in trie_get_next_key()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.8,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2024-50262","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-12-11T15:09:18.664200Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-11T15:18:34.769Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:27:42.104Z"}}]}}