CVE-2024-35903

In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accounting` emits code. Otherwise we will skip some instructions and most likely crash.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

History

24 Sep 2025, 21:06

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4 - () https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4 - Patch
References () https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028 - () https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028 - Patch
References () https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a - () https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a - Patch
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

21 Nov 2024, 09:21

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4 - () https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4 -
References () https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028 - () https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028 -
References () https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a - () https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a -

29 Oct 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: x86/bpf: corrige la IP después de emitir la contabilidad de profundidad de llamadas. Ajuste la IP pasada a `emit_patch` para que calcule el desplazamiento correcto para la instrucción CALL si `x86_call_ Depth_emit_accounting` emite código. De lo contrario, nos saltaremos algunas instrucciones y lo más probable es que fallemos.

19 May 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-19 09:15

Updated : 2025-09-24 21:06


NVD link : CVE-2024-35903

Mitre link : CVE-2024-35903

CVE.ORG link : CVE-2024-35903


JSON object : View

Products Affected

linux

  • linux_kernel