We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56665

bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog



Description

In the Linux kernel, the following vulnerability has been resolved: bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog Syzbot reported [1] crash that happens for following tracing scenario: - create tracepoint perf event with attr.inherit=1, attach it to the process and set bpf program to it - attached process forks -> chid creates inherited event the new child event shares the parent's bpf program and tp_event (hence prog_array) which is global for tracepoint - exit both process and its child -> release both events - first perf_event_detach_bpf_prog call will release tp_event->prog_array and second perf_event_detach_bpf_prog will crash, because tp_event->prog_array is NULL The fix makes sure the perf_event_detach_bpf_prog checks prog_array is valid before it tries to remove the bpf program from it. [1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad

Reserved 2024-12-27 | Published 2024-12-27 | Updated 2025-01-20 | Assigner Linux

Product status

Default status
unaffected

7a5c653ede645693422e43cccaa3e8f905d21c74 before 842e5af282453983586e2eae3c8eaf252de5f22f
affected

21db2f35fa97e4a3447f2edeb7b2569a8bfdc83b before c2b6b47662d5f2dfce92e5ffbdcac8229f321d9d
affected

0ee288e69d033850bc87abe0f9cc3ada24763d7f before dfb15ddf3b65e0df2129f9756d1b4fa78055cdb3
affected

0ee288e69d033850bc87abe0f9cc3ada24763d7f before 978c4486cca5c7b9253d3ab98a88c8e769cb9bbd
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.1.121
unaffected

6.6.67
unaffected

6.12.6
unaffected

6.13
unaffected

References

git.kernel.org/...c/842e5af282453983586e2eae3c8eaf252de5f22f

git.kernel.org/...c/c2b6b47662d5f2dfce92e5ffbdcac8229f321d9d

git.kernel.org/...c/dfb15ddf3b65e0df2129f9756d1b4fa78055cdb3

git.kernel.org/...c/978c4486cca5c7b9253d3ab98a88c8e769cb9bbd

cve.org (CVE-2024-56665)

nvd.nist.gov (CVE-2024-56665)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56665

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.