CVE-2024-47794
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-47794 addresses a vulnerability in the Linux kernel related to an infinite loop issue that occurs when using a combination of tail calls and freplace functionality. The vulnerability was discovered and disclosed on January 11, 2025, affecting the Linux kernel's BPF (Berkeley Packet Filter) subsystem (NVD, Debian Tracker).

Technical details

The vulnerability stems from an infinite loop condition that occurs in the BPF subsystem when combining tail calls with freplace operations. The issue manifests when the attach target for entry_freplace of tailcall_freplace.c is subprog_tc of tc_bpf2bpf.c, while the tail call in entry_freplace leads to entry_tc. This creates an infinite loop pattern: entry_tc -> subprog_tc -> entry_freplace --tailcall-> entry_tc. The problem occurs because the tail_call_cnt in entry_freplace resets to zero each time entry_freplace is executed, preventing the tail call mechanism from terminating (Kernel Commit). According to Red Hat's assessment, this vulnerability has been assigned a CVSS v3.1 score of 4.4 (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H) (Red Hat XML).

Impact

The vulnerability can lead to a kernel panic due to the infinite loop condition, potentially causing system instability or denial of service. The impact is somewhat limited as it requires privileged access (CAP_SYS_ADMIN or root) to exploit, as unprivileged users are prevented from using eBPF by default through the kernel.unprivileged_bpf_disabled sysctl setting (Red Hat XML).

Mitigation and workarounds

The fix implements a two-fold solution: 1) Preventing updates to a program extended by a freplace program to a prog_array map, and 2) Preventing the extension of a program that is already part of a prog_array map with a freplace program. Additionally, the fix returns -EINVAL if the program has a type of BPF_PROG_TYPE_EXT when adding it to a prog_array map (Kernel Commit).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-71142N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-core
NoNoJan 14, 2026
CVE-2025-71137N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k
NoYesJan 14, 2026
CVE-2025-71135N/AN/A
  • Linux KernelLinux Kernel
  • rv
NoNoJan 14, 2026
CVE-2025-71134N/AN/A
  • Linux KernelLinux Kernel
  • kernel-zfcpdump
NoNoJan 14, 2026
CVE-2025-71133N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-debug
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management