Логотип exploitDog
bind:"GHSA-27cc-fvv7-2rh9" OR bind:"CVE-2024-56786"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-27cc-fvv7-2rh9" OR bind:"CVE-2024-56786"

Количество 8

Количество 8

github логотип

GHSA-27cc-fvv7-2rh9

около 1 года назад

In the Linux kernel, the following vulnerability has been resolved: bpf: put bpf_link's program when link is safe to be deallocated In general, BPF link's underlying BPF program should be considered to be reachable through attach hook -> link -> prog chain, and, pessimistically, we have to assume that as long as link's memory is not safe to free, attach hook's code might hold a pointer to BPF program and use it. As such, it's not (generally) correct to put link's program early before waiting for RCU GPs to go through. More eager bpf_prog_put() that we currently do is mostly correct due to BPF program's release code doing similar RCU GP waiting, but as will be shown in the following patches, BPF program can be non-sleepable (and, thus, reliant on only "classic" RCU GP), while BPF link's attach hook can have sleepable semantics and needs to be protected by RCU Tasks Trace, and for such cases BPF link has to go through RCU Tasks Trace + "classic" RCU GPs before being deallocated. An...

CVSS3: 5.5
EPSS: Низкий
ubuntu логотип

CVE-2024-56786

около 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
redhat логотип

CVE-2024-56786

около 1 года назад

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: bpf: put bpf_link's program when link is safe to be deallocated

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2024-56786

около 1 года назад

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

EPSS: Низкий
msrc логотип

CVE-2024-56786

11 месяцев назад

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2025-15365

больше 1 года назад

Уязвимость функции bpf_link_inc() модуля kernel/bpf/syscall.c поддержки интерпретатора BPF ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20518-0

3 месяца назад

ELSA-2025-20518-0: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:20518

3 месяца назад

Moderate: kernel security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-27cc-fvv7-2rh9

In the Linux kernel, the following vulnerability has been resolved: bpf: put bpf_link's program when link is safe to be deallocated In general, BPF link's underlying BPF program should be considered to be reachable through attach hook -> link -> prog chain, and, pessimistically, we have to assume that as long as link's memory is not safe to free, attach hook's code might hold a pointer to BPF program and use it. As such, it's not (generally) correct to put link's program early before waiting for RCU GPs to go through. More eager bpf_prog_put() that we currently do is mostly correct due to BPF program's release code doing similar RCU GP waiting, but as will be shown in the following patches, BPF program can be non-sleepable (and, thus, reliant on only "classic" RCU GP), while BPF link's attach hook can have sleepable semantics and needs to be protected by RCU Tasks Trace, and for such cases BPF link has to go through RCU Tasks Trace + "classic" RCU GPs before being deallocated. An...

CVSS3: 5.5
около 1 года назад
ubuntu логотип
CVE-2024-56786

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

около 1 года назад
redhat логотип
CVE-2024-56786

[REJECTED CVE] In the Linux kernel, the following vulnerability has been resolved: bpf: put bpf_link's program when link is safe to be deallocated

CVSS3: 4.4
около 1 года назад
nvd логотип
CVE-2024-56786

Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

около 1 года назад
msrc логотип
CVSS3: 5.5
11 месяцев назад
fstec логотип
BDU:2025-15365

Уязвимость функции bpf_link_inc() модуля kernel/bpf/syscall.c поддержки интерпретатора BPF ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
больше 1 года назад
oracle-oval логотип
ELSA-2025-20518-0

ELSA-2025-20518-0: kernel security update (MODERATE)

3 месяца назад
rocky логотип
RLSA-2025:20518

Moderate: kernel security update

3 месяца назад

Уязвимостей на страницу