CVE-2024-35903: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accounting` emits code. Otherwise we will skip some instructions and most likely crash.
AI Analysis
Technical Summary
CVE-2024-35903 is a medium-severity vulnerability identified in the Linux kernel, specifically affecting the x86 architecture's Berkeley Packet Filter (BPF) subsystem. The issue arises from an incorrect calculation of the instruction pointer (IP) offset passed to the emit_patch function during the emission of call depth accounting code. The vulnerability occurs when the x86_call_depth_emit_accounting function emits additional code, but the IP adjustment does not correctly account for this, resulting in skipped instructions and a high likelihood of kernel crashes. This flaw is rooted in the kernel's handling of BPF call instructions, which are used for executing user-defined programs within the kernel space. The improper offset calculation can cause the kernel to execute invalid instructions or jump incorrectly, leading to denial of service through system instability or crashes. The vulnerability requires local privileges with low complexity to exploit (AV:L/AC:L/PR:L/UI:N), meaning an attacker with limited local access and privileges can trigger this issue without user interaction. However, it does not impact confidentiality or integrity directly, as it does not allow code execution or privilege escalation, but it severely affects availability by causing kernel crashes. The vulnerability has been patched in recent Linux kernel versions, and no known exploits are currently reported in the wild. The affected versions are identified by specific commit hashes, indicating that the issue is present in certain kernel builds prior to the fix. The CVSS score of 5.5 reflects a medium severity level, primarily due to the impact on availability and the requirement for local access and privileges.
Potential Impact
For European organizations, the primary impact of CVE-2024-35903 is the potential for denial of service (DoS) conditions on Linux systems running vulnerable kernel versions. This can disrupt critical services, especially in environments relying heavily on Linux servers, such as web hosting, cloud infrastructure, telecommunications, and industrial control systems. Since the vulnerability requires local access with some privileges, insider threats or compromised user accounts could exploit this flaw to cause system instability or crashes, leading to downtime and potential operational disruptions. The lack of impact on confidentiality and integrity reduces the risk of data breaches or unauthorized data manipulation. However, availability disruptions can have cascading effects, including loss of productivity, service outages, and potential financial losses. Organizations with high availability requirements, such as financial institutions, healthcare providers, and government agencies, may face significant operational risks if this vulnerability is exploited. Additionally, the vulnerability affects the BPF subsystem, which is increasingly used for advanced networking and security monitoring; thus, its exploitation could impair these functions, reducing visibility and control over network traffic.
Mitigation Recommendations
To mitigate CVE-2024-35903, European organizations should prioritize updating their Linux kernels to the latest patched versions that address this vulnerability. Kernel upgrades should be tested in staging environments to ensure compatibility with existing applications and services. Organizations should implement strict access controls to limit local user privileges, minimizing the number of users who can exploit this vulnerability. Employing mandatory access control frameworks such as SELinux or AppArmor can further restrict the ability of users to execute arbitrary BPF programs or perform kernel-level operations. Monitoring and auditing local user activities can help detect attempts to exploit the vulnerability. Additionally, organizations should consider disabling or restricting BPF usage where it is not essential, as this reduces the attack surface. For environments where kernel updates are delayed, applying temporary workarounds such as limiting access to vulnerable systems or isolating them within network segments can reduce risk. Finally, maintaining an up-to-date inventory of Linux kernel versions deployed across the organization will facilitate rapid identification and remediation of vulnerable systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2024-35903: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to `emit_patch` so it calculates the correct offset for the CALL instruction if `x86_call_depth_emit_accounting` emits code. Otherwise we will skip some instructions and most likely crash.
AI-Powered Analysis
Technical Analysis
CVE-2024-35903 is a medium-severity vulnerability identified in the Linux kernel, specifically affecting the x86 architecture's Berkeley Packet Filter (BPF) subsystem. The issue arises from an incorrect calculation of the instruction pointer (IP) offset passed to the emit_patch function during the emission of call depth accounting code. The vulnerability occurs when the x86_call_depth_emit_accounting function emits additional code, but the IP adjustment does not correctly account for this, resulting in skipped instructions and a high likelihood of kernel crashes. This flaw is rooted in the kernel's handling of BPF call instructions, which are used for executing user-defined programs within the kernel space. The improper offset calculation can cause the kernel to execute invalid instructions or jump incorrectly, leading to denial of service through system instability or crashes. The vulnerability requires local privileges with low complexity to exploit (AV:L/AC:L/PR:L/UI:N), meaning an attacker with limited local access and privileges can trigger this issue without user interaction. However, it does not impact confidentiality or integrity directly, as it does not allow code execution or privilege escalation, but it severely affects availability by causing kernel crashes. The vulnerability has been patched in recent Linux kernel versions, and no known exploits are currently reported in the wild. The affected versions are identified by specific commit hashes, indicating that the issue is present in certain kernel builds prior to the fix. The CVSS score of 5.5 reflects a medium severity level, primarily due to the impact on availability and the requirement for local access and privileges.
Potential Impact
For European organizations, the primary impact of CVE-2024-35903 is the potential for denial of service (DoS) conditions on Linux systems running vulnerable kernel versions. This can disrupt critical services, especially in environments relying heavily on Linux servers, such as web hosting, cloud infrastructure, telecommunications, and industrial control systems. Since the vulnerability requires local access with some privileges, insider threats or compromised user accounts could exploit this flaw to cause system instability or crashes, leading to downtime and potential operational disruptions. The lack of impact on confidentiality and integrity reduces the risk of data breaches or unauthorized data manipulation. However, availability disruptions can have cascading effects, including loss of productivity, service outages, and potential financial losses. Organizations with high availability requirements, such as financial institutions, healthcare providers, and government agencies, may face significant operational risks if this vulnerability is exploited. Additionally, the vulnerability affects the BPF subsystem, which is increasingly used for advanced networking and security monitoring; thus, its exploitation could impair these functions, reducing visibility and control over network traffic.
Mitigation Recommendations
To mitigate CVE-2024-35903, European organizations should prioritize updating their Linux kernels to the latest patched versions that address this vulnerability. Kernel upgrades should be tested in staging environments to ensure compatibility with existing applications and services. Organizations should implement strict access controls to limit local user privileges, minimizing the number of users who can exploit this vulnerability. Employing mandatory access control frameworks such as SELinux or AppArmor can further restrict the ability of users to execute arbitrary BPF programs or perform kernel-level operations. Monitoring and auditing local user activities can help detect attempts to exploit the vulnerability. Additionally, organizations should consider disabling or restricting BPF usage where it is not essential, as this reduces the attack surface. For environments where kernel updates are delayed, applying temporary workarounds such as limiting access to vulnerable systems or isolating them within network segments can reduce risk. Finally, maintaining an up-to-date inventory of Linux kernel versions deployed across the organization will facilitate rapid identification and remediation of vulnerable systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T13:50:33.115Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe2127
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 7:57:07 AM
Last updated: 7/27/2025, 1:49:12 AM
Views: 10
Related Threats
CVE-2025-54959: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54958: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Mubit co.,ltd. Powered BLUE 870
MediumCVE-2025-54940: Code injection in WPEngine, Inc. Advanced Custom Fields
LowCVE-2025-8708: Deserialization in Antabot White-Jotter
LowCVE-2025-8707: Improper Export of Android Application Components in Huuge Box App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.