In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix bpfgetsmpprocessorid() on !CONFIG_SMP
On x86-64 calling bpfgetsmpprocessorid() in a kernel with CONFIGSMP disabled can trigger the following bug, as pcpuhot is unavailable:
[ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c [ 8.471849] #PF: supervisor read access in kernel mode [ 8.471881] #PF: error_code(0x0000) - not-present page
Fix by inlining a return 0 in the !CONFIG_SMP case.
[ { "target": { "file": "kernel/bpf/verifier.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4ab7d74247b0150547cf909b3f6f24ee85183df", "digest": { "line_hashes": [ "292937590654672651938495969270139238349", "327120276520573874084669282434362494633", "2839418686314703673911965011327621812", "82053788119445071907761492795523895771", "145489407102292311739044717856609095934", "250879218055917607430561472978256816398", "271293093316237945641413480422838465357" ], "threshold": 0.9 }, "signature_version": "v1", "id": "CVE-2024-56768-8f6a8de5", "signature_type": "Line", "deprecated": false }, { "target": { "function": "do_misc_fixups", "file": "kernel/bpf/verifier.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f4ab7d74247b0150547cf909b3f6f24ee85183df", "digest": { "length": 20215.0, "function_hash": "23165225368717714363258240857485445468" }, "signature_version": "v1", "id": "CVE-2024-56768-93abcea6", "signature_type": "Function", "deprecated": false }, { "target": { "file": "kernel/bpf/verifier.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@23579010cf0a12476e96a5f1acdf78a9c5843657", "digest": { "line_hashes": [ "292937590654672651938495969270139238349", "327120276520573874084669282434362494633", "2839418686314703673911965011327621812", "82053788119445071907761492795523895771", "145489407102292311739044717856609095934", "250879218055917607430561472978256816398", "271293093316237945641413480422838465357" ], "threshold": 0.9 }, "signature_version": "v1", "id": "CVE-2024-56768-f45ab2a5", "signature_type": "Line", "deprecated": false }, { "target": { "function": "do_misc_fixups", "file": "kernel/bpf/verifier.c" }, "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@23579010cf0a12476e96a5f1acdf78a9c5843657", "digest": { "length": 20215.0, "function_hash": "23165225368717714363258240857485445468" }, "signature_version": "v1", "id": "CVE-2024-56768-f9169087", "signature_type": "Function", "deprecated": false } ]