Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Prevent decl_tag from being referenced in func_proto arg Syzkaller managed to hit another decl_tag issue: btf_func_proto_check kernel/bpf/btf.c:4506 [inline] btf_check_all_types kernel/bpf/btf.c:4734 [inline] btf_parse_type_sec+0x1175/0x1980 kernel/bpf/btf.c:4763 btf_parse kernel/bpf/btf.c:5042 [inline] btf_new_fd+0x65a/0xb00 kernel/bpf/btf.c:6709 bpf_btf_load+0x6f/0x90 kernel/bpf/syscall.c:4342 __sys_bpf+0x50a/0x6c0 kernel/bpf/syscall.c:5034 __do_sys_bpf kernel/bpf/syscall.c:5093 [inline] __se_sys_bpf kernel/bpf/syscall.c:5091 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5091 do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48 This seems similar to commit ea68376c8bed ("bpf: prevent decl_tag from being referenced in func_proto") but for the argument.
Product status
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 89357aa97b521fca76e39d81e2b1ac5edb3d0b96
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 329a76635548ee8fceb3b78c7d54d96524e80925
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before b327c68ace71ba9cb3105ae6a5955a229e9bdca3
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 3f3d54962a032581996edda8e6bcbf7a30371234
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e6d276dcc9204f95632580c43d66c52ca502d7ec
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before f17472d4599697d701aa239b4c475a506bccfd19
5.4.229 (semver)
5.10.163 (semver)
5.15.86 (semver)
6.0.16 (semver)
6.1.2 (semver)
6.2 (original_commit_for_fix)
References
git.kernel.org/...c/89357aa97b521fca76e39d81e2b1ac5edb3d0b96
git.kernel.org/...c/329a76635548ee8fceb3b78c7d54d96524e80925
git.kernel.org/...c/b327c68ace71ba9cb3105ae6a5955a229e9bdca3
git.kernel.org/...c/3f3d54962a032581996edda8e6bcbf7a30371234
git.kernel.org/...c/e6d276dcc9204f95632580c43d66c52ca502d7ec
git.kernel.org/...c/f17472d4599697d701aa239b4c475a506bccfd19
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.