CVE-2024-43840
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG<br />
<br />
When BPF_TRAMP_F_CALL_ORIG is set, the trampoline calls<br />
__bpf_tramp_enter() and __bpf_tramp_exit() functions, passing them<br />
the struct bpf_tramp_image *im pointer as an argument in R0.<br />
<br />
The trampoline generation code uses emit_addr_mov_i64() to emit<br />
instructions for moving the bpf_tramp_image address into R0, but<br />
emit_addr_mov_i64() assumes the address to be in the vmalloc() space<br />
and uses only 48 bits. Because bpf_tramp_image is allocated using<br />
kzalloc(), its address can use more than 48-bits, in this case the<br />
trampoline will pass an invalid address to __bpf_tramp_enter/exit()<br />
causing a kernel crash.<br />
<br />
Fix this by using emit_a64_mov_i64() in place of emit_addr_mov_i64()<br />
as it can work with addresses that are greater than 48-bits.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/077149478497b2f00ff4fd9da2c892defa6418d8
- https://git.kernel.org/stable/c/19d3c179a37730caf600a97fed3794feac2b197b
- https://git.kernel.org/stable/c/6d218fcc707d6b2c3616b6cd24b948fd4825cfec
- https://git.kernel.org/stable/c/d9664e6ff040798a46cdc5d401064f55b8676c83
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html



