CVE-2024-40996

Source
https://cve.org/CVERecord?id=CVE-2024-40996
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40996.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-40996
Downstream
Published
2024-07-12T12:37:38.454Z
Modified
2026-05-15T04:09:48.149438262Z
Summary
bpf: Avoid splat in pskb_pull_reason
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Avoid splat in pskbpullreason

syzkaller builds (CONFIGDEBUGNET=y) frequently trigger a debug hint in pskbmaypull.

We'd like to retain this debug check because it might hint at integer overflows and other issues (kernel code should pull headers, not huge value).

In bpf case, this splat isn't interesting at all: such (nonsensical) bpf programs are typically generated by a fuzzer anyway.

Do what Eric suggested and suppress such warning.

For CONFIGDEBUGNET=n we don't need the extra check because pskbmaypull will do the right thing: return an error without the WARN() backtrace.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/40xxx/CVE-2024-40996.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.96
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.36
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.9.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40996.json"