HomeDefectsLIN1021-9889
Acknowledged

LIN1021-9889 : Security Advisory - linux - CVE-2024-38564

Created: Jun 19, 2024    Updated: Mar 11, 2026
Resolved Date: Mar 9, 2026
Found In Version: 10.21.20.1
Severity: Standard
Applicable for: Wind River Linux LTS 21
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:

bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE

bpf_prog_attach uses attach_type_to_prog_type to enforce proper
attach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses
bpf_prog_get and relies on bpf_prog_attach_check_attach_type
to properly verify prog_type <> attach_type association.

Add missing attach_type enforcement for the link_create case.
Otherwise, it's currently possible to attach cgroup_skb prog
types to other cgroup hooks.

========Wind River Notice========
*Mitigation:*
Customers can use kernel.unprivileged_bpf_disabled sysctl to prevent unprivileged users from being able to use eBPF. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.
 
Inspect kernel.unprivileged_bpf_disabled sysctl with the command:
    

cat /proc/sys/kernel/unprivileged_bpf_disabled


The setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.
    

echo 1 > /proc/sys/kernel/unprivileged_bpf_disabled


For more details, please refer to Linux kernel official document:
https://docs.kernel.org/admin-guide/sysctl/kernel.html#unprivileged-bpf-disabled

CVEs