CVE-2024-43843

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
29/10/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv, bpf: Fix out-of-bounds issue when preparing trampoline image<br /> <br /> We get the size of the trampoline image during the dry run phase and<br /> allocate memory based on that size. The allocated image will then be<br /> populated with instructions during the real patch phase. But after<br /> commit 26ef208c209a ("bpf: Use arch_bpf_trampoline_size"), the `im`<br /> argument is inconsistent in the dry run and real patch phase. This may<br /> cause emit_imm in RV64 to generate a different number of instructions<br /> when generating the &amp;#39;im&amp;#39; address, potentially causing out-of-bounds<br /> issues. Let&amp;#39;s emit the maximum number of instructions for the "im"<br /> address during dry run to fix this problem.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.10.3 (excluding)