CVE-2024-43838

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-43838
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43838.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43838
Downstream
Published
2024-08-17T09:21:54.435Z
Modified
2025-11-26T19:34:02.249925Z
Summary
bpf: fix overflow check in adjust_jmp_off()
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: fix overflow check in adjustjmpoff()

adjustjmpoff() incorrectly used the insn->imm field for all overflow check, which is incorrect as that should only be done or the BPFJMP32 | BPFJA case, not the general jump instruction case. Fix it by using insn->off for overflow check in the general case.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/9c3874e559580d6c6ec8d449812ac11277724770/cves/2024/43xxx/CVE-2024-43838.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5337ac4c9b807bc46baa0713121a0afa8beacd70
Fixed
345652866a8869825a2a582ee5a28d75141f184a
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
5337ac4c9b807bc46baa0713121a0afa8beacd70
Fixed
4a04b4f0de59dd5c621e78f15803ee0b0544eeb8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
e47a1a791d32bd6c8f71d23c84294f2c053553a1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.10.0
Fixed
6.10.3