CVE-2024-35903

In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accounting` emits code. Otherwise we will skip some instructions and most likely crash.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*

History

24 Sep 2025, 21:06

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4 - () https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4 - Patch
References () https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028 - () https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028 - Patch
References () https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a - () https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a - Patch
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2024-05-19 09:15

Updated : 2025-09-24 21:06


NVD link : CVE-2024-35903

Mitre link : CVE-2024-35903

CVE.ORG link : CVE-2024-35903


JSON object : View

Products Affected

linux

  • linux_kernel