Lucene search

K
cvelistLinuxCVELIST:CVE-2024-35860
HistoryMay 19, 2024 - 8:34 a.m.

CVE-2024-35860 bpf: support deferring bpf_link dealloc to after RCU grace period

2024-05-1908:34:19
Linux
www.cve.org
5
linux kernel
cve-2024-35860
vulnerability
bpf_link
rcu grace period
bpf
program types
multi-kprobes
multi-uprobes
sleepable bpf programs
rcu_trace_implies_rcu_gp
raw_tp link

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

15.5%

In the Linux kernel, the following vulnerability has been resolved:

bpf: support deferring bpf_link dealloc to after RCU grace period

BPF link for some program types is passed as a “context” which can be
used by those BPF programs to look up additional information. E.g., for
multi-kprobes and multi-uprobes, link is used to fetch BPF cookie values.

Because of this runtime dependency, when bpf_link refcnt drops to zero
there could still be active BPF programs running accessing link data.

This patch adds generic support to defer bpf_link dealloc callback to
after RCU GP, if requested. This is done by exposing two different
deallocation callbacks, one synchronous and one deferred. If deferred
one is provided, bpf_link_free() will schedule dealloc_deferred()
callback to happen after RCU GP.

BPF is using two flavors of RCU: “classic” non-sleepable one and RCU
tasks trace one. The latter is used when sleepable BPF programs are
used. bpf_link_free() accommodates that by checking underlying BPF
program’s sleepable flag, and goes either through normal RCU GP only for
non-sleepable, or through RCU tasks trace GP and then normal RCU GP
(taking into account rcu_trace_implies_rcu_gp() optimization), if BPF
program is sleepable.

We use this for multi-kprobe and multi-uprobe links, which dereference
link during program run. We also preventively switch raw_tp link to use
deferred dealloc callback, as upcoming changes in bpf-next tree expose
raw_tp link data (specifically, cookie value) to BPF program at runtime
as well.

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/linux/bpf.h",
      "kernel/bpf/syscall.c",
      "kernel/trace/bpf_trace.c"
    ],
    "versions": [
      {
        "version": "0dcac2725406",
        "lessThan": "876941f533e7",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "0dcac2725406",
        "lessThan": "5d8d44777756",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "0dcac2725406",
        "lessThan": "1a80dbcb2dba",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "include/linux/bpf.h",
      "kernel/bpf/syscall.c",
      "kernel/trace/bpf_trace.c"
    ],
    "versions": [
      {
        "version": "5.18",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.18",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.26",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8.5",
        "lessThanOrEqual": "6.8.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

15.5%