First published: Fri Nov 08 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fix address emission with tag-based KASAN enabled When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image struct on the stack is passed during the size calculation pass and an address on the heap is passed during code generation. This may cause a heap buffer overflow if the heap address is tagged because emit_a64_mov_i64() will emit longer code than it did during the size calculation pass. The same problem could occur without tag-based KASAN if one of the 16-bit words of the stack address happened to be all-ones during the size calculation pass. Fix the problem by assuming the worst case (4 instructions) when calculating the size of the bpf_tramp_image address emission.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=6.10.3<6.11 | |
Linux Kernel | >=6.11<6.11.6 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
Linux Kernel | =6.12-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50203 has not been assigned a specific severity rating, but it impacts various versions of the Linux kernel.
To resolve CVE-2024-50203, users should upgrade to a patched version of the Linux kernel that addresses this vulnerability.
CVE-2024-50203 affects Linux kernel versions from 6.10.3 to 6.11, as well as specific release candidates of version 6.12.
CVE-2024-50203 is a vulnerability in the Linux kernel's BPF subsystem related to address emission when tag-based KASAN is enabled.
The exploitability of CVE-2024-50203 in a production environment depends on the specific use case and configuration of the affected kernel versions.