
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability has been identified related to the handling of skb (socket buffer) in the bpf cpumap functionality. The issue was discovered when running xdpredirectcpu with both skb-mode and stress-mode enabled, causing incorrect XDP memory type usage warnings (NVD).
The vulnerability stems from two main issues: First, the kthread cpumapkthreadrun() is stopped prematurely. Second, the _cpumapringcleanup() function doesn't properly handle skb mode and incorrectly treats skbs in ptrring as XDP frames. This leads to incorrect XDP memory type (-2128176192) usage warnings at net/core/xdp.c:405 (NVD).
When triggered, the vulnerability results in incorrect memory handling and potential system warnings. The issue specifically affects the XDP (eXpress Data Path) functionality in the Linux kernel's networking stack, which could impact network packet processing efficiency and system stability (NVD).
The issue has been addressed through a patch that ensures proper handling of skb in ptrring cleanup. The fix involves modifying _cpumapringcleanup() to properly handle and free skbs in ptrring, implementing a more graceful cleanup process (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."