In the Linux kernel, the following vulnerability has been resolved:
x86/bpf: Fix IP after emitting call depth accounting
Adjust the IP passed to emit_patch so it calculates the correct offset
for the CALL instruction if x86_call_depth_emit_accounting emits code.
Otherwise we will skip some instructions and most likely crash.
[
{
"target": {
"file": "arch/x86/net/bpf_jit_comp.c"
},
"digest": {
"line_hashes": [
"171710062141521289538570770064597341321",
"292485672431164659395266968394964067295",
"253808683610344571122724562666205149915",
"11600049491434378627676149716948221440"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@81166178cf0a0062a22b1b3b5368183d39577028",
"signature_version": "v1",
"id": "CVE-2024-35903-12bcd9c5",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"file": "arch/x86/net/bpf_jit_comp.c"
},
"digest": {
"line_hashes": [
"171710062141521289538570770064597341321",
"292485672431164659395266968394964067295",
"253808683610344571122724562666205149915",
"11600049491434378627676149716948221440"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d98aa088386aee3db1b7b60b800c0fde0654a4a",
"signature_version": "v1",
"id": "CVE-2024-35903-239db786",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"file": "arch/x86/net/bpf_jit_comp.c"
},
"digest": {
"line_hashes": [
"171710062141521289538570770064597341321",
"292485672431164659395266968394964067295",
"253808683610344571122724562666205149915",
"11600049491434378627676149716948221440"
],
"threshold": 0.9
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f9d57c771656bfd651e22edcfdb5f60e62542d4",
"signature_version": "v1",
"id": "CVE-2024-35903-332c40e7",
"deprecated": false,
"signature_type": "Line"
},
{
"target": {
"file": "arch/x86/net/bpf_jit_comp.c",
"function": "emit_rsb_call"
},
"digest": {
"function_hash": "19856497880745226437993911140151003374",
"length": 178.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9d98aa088386aee3db1b7b60b800c0fde0654a4a",
"signature_version": "v1",
"id": "CVE-2024-35903-5d6b7994",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "arch/x86/net/bpf_jit_comp.c",
"function": "emit_rsb_call"
},
"digest": {
"function_hash": "19856497880745226437993911140151003374",
"length": 178.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@81166178cf0a0062a22b1b3b5368183d39577028",
"signature_version": "v1",
"id": "CVE-2024-35903-6e736115",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "arch/x86/net/bpf_jit_comp.c",
"function": "emit_rsb_call"
},
"digest": {
"function_hash": "19856497880745226437993911140151003374",
"length": 178.0
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3f9d57c771656bfd651e22edcfdb5f60e62542d4",
"signature_version": "v1",
"id": "CVE-2024-35903-ac235d94",
"deprecated": false,
"signature_type": "Function"
}
]