CVE-2024-40996

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-40996
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-40996.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-40996
Downstream
Published
2024-07-12T13:15:20Z
Modified
2025-08-09T20:01:28Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Avoid splat in pskbpullreason

syzkaller builds (CONFIGDEBUGNET=y) frequently trigger a debug hint in pskbmaypull.

We'd like to retain this debug check because it might hint at integer overflows and other issues (kernel code should pull headers, not huge value).

In bpf case, this splat isn't interesting at all: such (nonsensical) bpf programs are typically generated by a fuzzer anyway.

Do what Eric suggested and suppress such warning.

For CONFIGDEBUGNET=n we don't need the extra check because pskbmaypull will do the right thing: return an error without the WARN() backtrace.

References

Affected packages