In the Linux kernel, the following vulnerability has been resolved:
bpf,perf: Fix invalid progarray access in perfeventdetachbpf_prog
Syzbot reported [1] crash that happens for following tracing scenario:
attached process forks -> chid creates inherited event
the new child event shares the parent's bpf program and tpevent (hence progarray) which is global for tracepoint
exit both process and its child -> release both events
The fix makes sure the perfeventdetachbpfprog checks prog_array is valid before it tries to remove the bpf program from it.
[1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad
[ { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfb15ddf3b65e0df2129f9756d1b4fa78055cdb3", "signature_version": "v1", "target": { "function": "perf_event_detach_bpf_prog", "file": "kernel/trace/bpf_trace.c" }, "digest": { "function_hash": "137271896414062241333295425013310585087", "length": 503.0 }, "id": "CVE-2024-56665-0d9f376d" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@842e5af282453983586e2eae3c8eaf252de5f22f", "signature_version": "v1", "target": { "function": "perf_event_detach_bpf_prog", "file": "kernel/trace/bpf_trace.c" }, "digest": { "function_hash": "137271896414062241333295425013310585087", "length": 503.0 }, "id": "CVE-2024-56665-515383b2" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@842e5af282453983586e2eae3c8eaf252de5f22f", "signature_version": "v1", "target": { "file": "kernel/trace/bpf_trace.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "296054676379993569161782541441419720798", "129698392578024680677059231465067598796", "149292092161267675122147548814275779625", "294300124387276483936225103680178598168", "184301639333319912176497091878502783518", "53836139090465720688107815819252543977", "42468639315524856957786134128312921553" ] }, "id": "CVE-2024-56665-584556ee" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c2b6b47662d5f2dfce92e5ffbdcac8229f321d9d", "signature_version": "v1", "target": { "function": "perf_event_detach_bpf_prog", "file": "kernel/trace/bpf_trace.c" }, "digest": { "function_hash": "137271896414062241333295425013310585087", "length": 503.0 }, "id": "CVE-2024-56665-5f119c72" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c2b6b47662d5f2dfce92e5ffbdcac8229f321d9d", "signature_version": "v1", "target": { "file": "kernel/trace/bpf_trace.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "296054676379993569161782541441419720798", "129698392578024680677059231465067598796", "149292092161267675122147548814275779625", "294300124387276483936225103680178598168", "184301639333319912176497091878502783518", "53836139090465720688107815819252543977", "42468639315524856957786134128312921553" ] }, "id": "CVE-2024-56665-702b31e3" }, { "signature_type": "Function", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@978c4486cca5c7b9253d3ab98a88c8e769cb9bbd", "signature_version": "v1", "target": { "function": "perf_event_detach_bpf_prog", "file": "kernel/trace/bpf_trace.c" }, "digest": { "function_hash": "137271896414062241333295425013310585087", "length": 503.0 }, "id": "CVE-2024-56665-8fa4ec37" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dfb15ddf3b65e0df2129f9756d1b4fa78055cdb3", "signature_version": "v1", "target": { "file": "kernel/trace/bpf_trace.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "296054676379993569161782541441419720798", "129698392578024680677059231465067598796", "149292092161267675122147548814275779625", "294300124387276483936225103680178598168", "184301639333319912176497091878502783518", "53836139090465720688107815819252543977", "42468639315524856957786134128312921553" ] }, "id": "CVE-2024-56665-a875e5dd" }, { "signature_type": "Line", "deprecated": false, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@978c4486cca5c7b9253d3ab98a88c8e769cb9bbd", "signature_version": "v1", "target": { "file": "kernel/trace/bpf_trace.c" }, "digest": { "threshold": 0.9, "line_hashes": [ "296054676379993569161782541441419720798", "129698392578024680677059231465067598796", "149292092161267675122147548814275779625", "294300124387276483936225103680178598168", "184301639333319912176497091878502783518", "53836139090465720688107815819252543977", "42468639315524856957786134128312921553" ] }, "id": "CVE-2024-56665-e8c35d3a" } ]