{"vulnerability": "CVE-2024-58237", "sightings": [{"uuid": "467212fc-5c7f-4034-9eef-311136bc621d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58237", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114455911703454153", "content": "", "creation_timestamp": "2025-05-05T15:23:34.046949Z"}, {"uuid": "028d0615-cf35-45bd-a204-e52d03640354", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58237", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3logrdaeww422", "content": "", "creation_timestamp": "2025-05-05T16:16:30.867601Z"}, {"uuid": "f4c871d4-b7a5-4601-9484-3c932121369a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-58237", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15703", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-58237\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: consider that tail calls invalidate packet pointers\n\nTail-called programs could execute any of the helpers that invalidate\npacket pointers. Hence, conservatively assume that each tail call\ninvalidates packet pointers.\n\nMaking the change in bpf_helper_changes_pkt_data() automatically makes\nuse of check_cfg() logic that computes 'changes_pkt_data' effect for\nglobal sub-programs, such that the following program could be\nrejected:\n\n    int tail_call(struct __sk_buff *sk)\n    {\n     bpf_tail_call_static(sk, &amp;jmp_table, 0);\n     return 0;\n    }\n\n    SEC(\"tc\")\n    int not_safe(struct __sk_buff *sk)\n    {\n     int *p = (void *)(long)sk-&gt;data;\n     ... make p valid ...\n     tail_call(sk);\n     *p = 42; /* this is unsafe */\n     ...\n    }\n\nThe tc_bpf2bpf.c:subprog_tc() needs change: mark it as a function that\ncan invalidate packet pointers. Otherwise, it can't be freplaced with\ntailcall_freplace.c:entry_freplace() that does a tail call.\n\ud83d\udccf Published: 2025-05-05T14:53:34.153Z\n\ud83d\udccf Modified: 2025-05-09T08:06:10.185Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/f1692ee23dcaaddc24ba407b269707ee5df1301f\n2. https://git.kernel.org/stable/c/1c2244437f9ad3dd91215f920401a14f2542dbfc\n3. https://git.kernel.org/stable/c/1a4607ffba35bf2a630aab299e34dd3f6e658d70", "creation_timestamp": "2025-05-09T08:25:23.000000Z"}, {"uuid": "ba6334c0-dc17-4d90-9d7b-14702aa88fb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-58237", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}]}