In the Linux kernel, the following vulnerability has been resolved:
bpf: Set run context for rawtp test_run callback
syzbot reported crash when rawtp program executed through the
test_run interface calls bpf_get_attach_cookie helper or any
other helper that touches task->bpf_ctx pointer.
Setting the run context (task->bpf_ctx pointer) for test_run
callback.
References
Configurations
Configuration 1 (hide)
|
History
03 Oct 2025, 14:21
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | NVD-CWE-noinfo | |
References | () https://git.kernel.org/stable/c/3708b6c2546c9eb34aead8a34a17e8ae69004e4d - Patch | |
References | () https://git.kernel.org/stable/c/789bd77c9342aa6125003871ae5c6034d0f6f9d2 - Patch | |
References | () https://git.kernel.org/stable/c/ae0ba0ab7475a129ef7d449966edf677367efeb4 - Patch | |
References | () https://git.kernel.org/stable/c/d0d1df8ba18abc57f28fb3bc053b2bf319367f2c - Patch | |
References | () https://git.kernel.org/stable/c/d387805d4b4a46ee01e3dae133c81b6d80195e5b - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* |
21 Nov 2024, 09:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/3708b6c2546c9eb34aead8a34a17e8ae69004e4d - | |
References | () https://git.kernel.org/stable/c/789bd77c9342aa6125003871ae5c6034d0f6f9d2 - | |
References | () https://git.kernel.org/stable/c/ae0ba0ab7475a129ef7d449966edf677367efeb4 - | |
References | () https://git.kernel.org/stable/c/d0d1df8ba18abc57f28fb3bc053b2bf319367f2c - | |
References | () https://git.kernel.org/stable/c/d387805d4b4a46ee01e3dae133c81b6d80195e5b - | |
Summary |
|
12 Jul 2024, 16:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-12 13:15
Updated : 2025-10-03 14:21
NVD link : CVE-2024-40908
Mitre link : CVE-2024-40908
CVE.ORG link : CVE-2024-40908
JSON object : View
Products Affected
linux
- linux_kernel
CWE