CVE-2024-50203
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
08/11/2024
Last modified:
22/05/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf, arm64: Fix address emission with tag-based KASAN enabled<br />
<br />
When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image<br />
struct on the stack is passed during the size calculation pass and<br />
an address on the heap is passed during code generation. This may<br />
cause a heap buffer overflow if the heap address is tagged because<br />
emit_a64_mov_i64() will emit longer code than it did during the size<br />
calculation pass. The same problem could occur without tag-based<br />
KASAN if one of the 16-bit words of the stack address happened to<br />
be all-ones during the size calculation pass. Fix the problem by<br />
assuming the worst case (4 instructions) when calculating the size<br />
of the bpf_tramp_image address emission.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.10.3 (including) | 6.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11 (including) | 6.11.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



