Bug 1227783 (CVE-2024-40908)

Summary: VUL-0: CVE-2024-40908: kernel: bpf: Set run context for rawtp test_run callback
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Davide Benini <davide.benini>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: andrea.mattiazzo, davide.benini, denis.kirjanov, miroslav.franc, mkubecek
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/413835/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-40908:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-07-15 11:26:00 UTC
In the Linux kernel, the following vulnerability has been resolved:

bpf: Set run context for rawtp test_run callback

syzbot reported crash when rawtp program executed through the
test_run interface calls bpf_get_attach_cookie helper or any
other helper that touches task->bpf_ctx pointer.

Setting the run context (task->bpf_ctx pointer) for test_run
callback.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-40908
https://www.cve.org/CVERecord?id=CVE-2024-40908
https://git.kernel.org/stable/c/3708b6c2546c9eb34aead8a34a17e8ae69004e4d
https://git.kernel.org/stable/c/789bd77c9342aa6125003871ae5c6034d0f6f9d2
https://git.kernel.org/stable/c/ae0ba0ab7475a129ef7d449966edf677367efeb4
https://git.kernel.org/stable/c/d0d1df8ba18abc57f28fb3bc053b2bf319367f2c
https://git.kernel.org/stable/c/d387805d4b4a46ee01e3dae133c81b6d80195e5b
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-40908.mbox