In the Linux kernel, the following vulnerability has been resolved:
bpf: fix overflow check in adjust_jmp_off()
adjust_jmp_off() incorrectly used the insn->imm field for all overflow
check,
which is incorrect as that should only be done or the BPF_JMP32 | BPF_JA
case,
not the general jump instruction case. Fix it by using insn->off for
overflow
check in the general case.
git.kernel.org/linus/4a04b4f0de59dd5c621e78f15803ee0b0544eeb8 (6.11-rc1)
git.kernel.org/stable/c/345652866a8869825a2a582ee5a28d75141f184a
git.kernel.org/stable/c/4a04b4f0de59dd5c621e78f15803ee0b0544eeb8
launchpad.net/bugs/cve/CVE-2024-43838
nvd.nist.gov/vuln/detail/CVE-2024-43838
security-tracker.debian.org/tracker/CVE-2024-43838
www.cve.org/CVERecord?id=CVE-2024-43838