| ID | CVE-2024-50203 | 
      
          | Sažetak | In the Linux kernel, the following vulnerability has been resolved:
bpf, arm64: Fix address emission with tag-based KASAN enabled
When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image
struct on the stack is passed during the size calculation pass and
an address on the heap is passed during code generation. This may
cause a heap buffer overflow if the heap address is tagged because
emit_a64_mov_i64() will emit longer code than it did during the size
calculation pass. The same problem could occur without tag-based
KASAN if one of the 16-bit words of the stack address happened to
be all-ones during the size calculation pass. Fix the problem by
assuming the worst case (4 instructions) when calculating the size
of the bpf_tramp_image address emission. | 
      
          | Reference |  | 
      
        | CVSS | 
              | Base: | 7.8 |  | Impact: | 5.9 |  | Exploitability: | 1.8 |  | 
    
        | Pristup | 
            | Vektor | Složenost | Autentikacija |  
            | LOCAL | LOW | LOW |  | 
      
        | Impact | 
            | Povjerljivost | Cjelovitost | Dostupnost |  
            | HIGH | HIGH | HIGH |  | 
    
        | CVSS vektor | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 
      
          | Zadnje važnije ažuriranje | 22-05-2025 - 13:15 | 
      
          | Objavljeno | 08-11-2024 - 06:15 |