CVE-2024-43843

HIGH

Linux Kernel < 6.10.3 - Out-of-Bounds Access

Title source: rule
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: riscv, bpf: Fix out-of-bounds issue when preparing trampoline image We get the size of the trampoline image during the dry run phase and allocate memory based on that size. The allocated image will then be populated with instructions during the real patch phase. But after commit 26ef208c209a ("bpf: Use arch_bpf_trampoline_size"), the `im` argument is inconsistent in the dry run and real patch phase. This may cause emit_imm in RV64 to generate a different number of instructions when generating the 'im' address, potentially causing out-of-bounds issues. Let's emit the maximum number of instructions for the "im" address during dry run to fix this problem.

Scores

CVSS v3 7.8
EPSS 0.0005
EPSS Percentile 15.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-131
Status published
Products (2)
linux/Kernel 6.8.0 - 6.10.3linux
linux/linux_kernel 6.8 - 6.10.3
Published Aug 17, 2024
Tracked Since Feb 18, 2026