The following table lists the changes that have been made to the
CVE-2024-56768 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 416baaa9-dc9f-4396-8d5f-8c081fb06d67Jan. 06, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: bpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP
On x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP
disabled can trigger the following bug, as pcpu_hot is unavailable:[ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c
[ 8.471849] #PF: supervisor read access in kernel mode
[ 8.471881] #PF: error_code(0x0000) – not-present pageFix by inlining a return 0 in the !CONFIG_SMP case.
Added Reference https://git.kernel.org/stable/c/23579010cf0a12476e96a5f1acdf78a9c5843657 Added Reference https://git.kernel.org/stable/c/f4ab7d74247b0150547cf909b3f6f24ee85183df