
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-53125 is a vulnerability in the Linux kernel's BPF (Berkeley Packet Filter) subsystem, specifically related to the handling of subreg_def marks during range propagation. The vulnerability was discovered in September 2024 and disclosed in December 2024. It affects the BPF verifier's handling of register state synchronization when the BPF_F_TEST_RND_HI32 flag is set (Kernel Git).
The vulnerability occurs in the sync_linked_regs() function where range propagation incorrectly affects subreg_def marks. When BPF_F_TEST_RND_HI32 flag is set, the verifier may incorrectly rewrite code sequences involving register operations. The issue manifests when a register's subreg_def state is overridden during copy_register_state() operations, leading to potential missing zero extensions for architectures that require them for upper register halves (Kernel Git).
The vulnerability could potentially lead to incorrect verification of BPF programs, particularly affecting architectures that require zero extension for upper register halves. This could result in unexpected behavior when processing BPF programs with specific register operations and the BPF_F_TEST_RND_HI32 flag enabled (Kernel Git).
The issue has been fixed in multiple Linux kernel versions through a patch that preserves subreg_def marks during register state synchronization. The fix has been backported to various stable kernel versions including 6.1.x series. Users should update their Linux kernel to a patched version (Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."