In the Linux kernel, the following vulnerability has been...
High severity
Unreviewed
Published
Jul 30, 2024
to the GitHub Advisory Database
•
Updated Aug 5, 2024
Description
Published by the National Vulnerability Database
Jul 30, 2024
Published to the GitHub Advisory Database
Jul 30, 2024
Last updated
Aug 5, 2024
In the Linux kernel, the following vulnerability has been resolved:
bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD
[Changes from V1:
GCC warns that `val' may be used uninitialized in the
BPF_CRE_READ_BITFIELD macro, defined in bpf_core_read.h as:
This patch adds a default entry in the switch statement that sets
`val' to zero in order to avoid the warning, and random values to be
used in case __builtin_preserve_field_info returns unexpected values
for BPF_FIELD_BYTE_SIZE.
Tested in bpf-next master.
No regressions.
References