CVE-2024-56675

Source
https://cve.org/CVERecord?id=CVE-2024-56675
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56675.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56675
Downstream
Related
Published
2024-12-27T15:06:36.183Z
Modified
2026-03-11T07:54:50.873027Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors
Details

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors

Uprobes always use bpfprogrunarrayuprobe() under tasks-trace-RCU protection. But it is possible to attach a non-sleepable BPF program to a uprobe, and non-sleepable BPF programs are freed via normal RCU (see __bpfprogputnoref()). This leads to UAF of the bpfprog because a normal RCU grace period does not imply a tasks-trace-RCU grace period.

Fix it by explicitly waiting for a tasks-trace-RCU grace period after removing the attachment of a bpfprog to a perfevent.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/56xxx/CVE-2024-56675.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8c7dcb84e3b744b2b70baa7a44a9b1881c33a9c9
Fixed
9245459a992d22fe0e92e988f49db1fec82c184a
Fixed
f9f85df30118f3f4112761e6682fc60ebcce23e5
Fixed
9b53d2c2a38a1effc341d99be3f99fa7ef17047d
Fixed
ef1b808e3b7c98612feceedf985c2fbbeb28f956

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56675.json"