CVE-2024-56768 – Linux Kernel BPF privileges escalation vulnerability

The following table lists the changes that have been made to the
CVE-2024-56768 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jan. 06, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved:

    bpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP

    On x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP
    disabled can trigger the following bug, as pcpu_hot is unavailable:

    [ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c
    [ 8.471849] #PF: supervisor read access in kernel mode
    [ 8.471881] #PF: error_code(0x0000) – not-present page

    Fix by inlining a return 0 in the !CONFIG_SMP case.

    Added Reference https://git.kernel.org/stable/c/23579010cf0a12476e96a5f1acdf78a9c5843657
    Added Reference https://git.kernel.org/stable/c/f4ab7d74247b0150547cf909b3f6f24ee85183df
Share the Post:

Related Posts