๐Ÿ” CVE Alert

CVE-2024-56675

HIGH 7.8

bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors Uprobes always use bpf_prog_run_array_uprobe() under tasks-trace-RCU protection. But it is possible to attach a non-sleepable BPF program to a uprobe, and non-sleepable BPF programs are freed via normal RCU (see __bpf_prog_put_noref()). This leads to UAF of the bpf_prog because a normal RCU grace period does not imply a tasks-trace-RCU grace period. Fix it by explicitly waiting for a tasks-trace-RCU grace period after removing the attachment of a bpf_prog to a perf_event.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
8c7dcb84e3b744b2b70baa7a44a9b1881c33a9c9 < 9245459a992d22fe0e92e988f49db1fec82c184a 8c7dcb84e3b744b2b70baa7a44a9b1881c33a9c9 < f9f85df30118f3f4112761e6682fc60ebcce23e5 8c7dcb84e3b744b2b70baa7a44a9b1881c33a9c9 < 9b53d2c2a38a1effc341d99be3f99fa7ef17047d 8c7dcb84e3b744b2b70baa7a44a9b1881c33a9c9 < ef1b808e3b7c98612feceedf985c2fbbeb28f956
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9245459a992d22fe0e92e988f49db1fec82c184a git.kernel.org: https://git.kernel.org/stable/c/f9f85df30118f3f4112761e6682fc60ebcce23e5 git.kernel.org: https://git.kernel.org/stable/c/9b53d2c2a38a1effc341d99be3f99fa7ef17047d git.kernel.org: https://git.kernel.org/stable/c/ef1b808e3b7c98612feceedf985c2fbbeb28f956 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html