In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix bpfgetsmpprocessorid() on !CONFIG_SMP
On x86-64 calling bpfgetsmpprocessorid() in a kernel with CONFIGSMP disabled can trigger the following bug, as pcpuhot is unavailable:
[ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c [ 8.471849] #PF: supervisor read access in kernel mode [ 8.471881] #PF: error_code(0x0000) - not-present page
Fix by inlining a return 0 in the !CONFIG_SMP case.
[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"292937590654672651938495969270139238349",
"327120276520573874084669282434362494633",
"2839418686314703673911965011327621812",
"82053788119445071907761492795523895771",
"145489407102292311739044717856609095934",
"250879218055917607430561472978256816398",
"271293093316237945641413480422838465357"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4ab7d74247b0150547cf909b3f6f24ee85183df",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-56768-8f6a8de5",
"target": {
"file": "kernel/bpf/verifier.c"
}
},
{
"digest": {
"length": 20215.0,
"function_hash": "23165225368717714363258240857485445468"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4ab7d74247b0150547cf909b3f6f24ee85183df",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-56768-93abcea6",
"target": {
"file": "kernel/bpf/verifier.c",
"function": "do_misc_fixups"
}
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"292937590654672651938495969270139238349",
"327120276520573874084669282434362494633",
"2839418686314703673911965011327621812",
"82053788119445071907761492795523895771",
"145489407102292311739044717856609095934",
"250879218055917607430561472978256816398",
"271293093316237945641413480422838465357"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@23579010cf0a12476e96a5f1acdf78a9c5843657",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-56768-f45ab2a5",
"target": {
"file": "kernel/bpf/verifier.c"
}
},
{
"digest": {
"length": 20215.0,
"function_hash": "23165225368717714363258240857485445468"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@23579010cf0a12476e96a5f1acdf78a9c5843657",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2024-56768-f9169087",
"target": {
"file": "kernel/bpf/verifier.c",
"function": "do_misc_fixups"
}
}
]