CVE-2024-43843
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
29/10/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
riscv, bpf: Fix out-of-bounds issue when preparing trampoline image<br />
<br />
We get the size of the trampoline image during the dry run phase and<br />
allocate memory based on that size. The allocated image will then be<br />
populated with instructions during the real patch phase. But after<br />
commit 26ef208c209a ("bpf: Use arch_bpf_trampoline_size"), the `im`<br />
argument is inconsistent in the dry run and real patch phase. This may<br />
cause emit_imm in RV64 to generate a different number of instructions<br />
when generating the &#39;im&#39; address, potentially causing out-of-bounds<br />
issues. Let&#39;s emit the maximum number of instructions for the "im"<br />
address during dry run to fix this problem.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.10.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



