CVE-2023-52621
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/03/2024
Last modified:
25/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers<br />
<br />
These three bpf_map_{lookup,update,delete}_elem() helpers are also<br />
available for sleepable bpf program, so add the corresponding lock<br />
assertion for sleepable bpf program, otherwise the following warning<br />
will be reported when a sleepable bpf program manipulates bpf map under<br />
interpreter mode (aka bpf_jit_enable=0):<br />
<br />
WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......<br />
CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......<br />
RIP: 0010:bpf_map_lookup_elem+0x54/0x60<br />
......<br />
Call Trace:<br />
<br />
? __warn+0xa5/0x240<br />
? bpf_map_lookup_elem+0x54/0x60<br />
? report_bug+0x1ba/0x1f0<br />
? handle_bug+0x40/0x80<br />
? exc_invalid_op+0x18/0x50<br />
? asm_exc_invalid_op+0x1b/0x20<br />
? __pfx_bpf_map_lookup_elem+0x10/0x10<br />
? rcu_lockdep_current_cpu_online+0x65/0xb0<br />
? rcu_is_watching+0x23/0x50<br />
? bpf_map_lookup_elem+0x54/0x60<br />
? __pfx_bpf_map_lookup_elem+0x10/0x10<br />
___bpf_prog_run+0x513/0x3b70<br />
__bpf_prog_run32+0x9d/0xd0<br />
? __bpf_prog_enter_sleepable_recur+0xad/0x120<br />
? __bpf_prog_enter_sleepable_recur+0x3e/0x120<br />
bpf_trampoline_6442580665+0x4d/0x1000<br />
__x64_sys_getpgid+0x5/0x30<br />
? do_syscall_64+0x36/0xb0<br />
entry_SYSCALL_64_after_hwframe+0x6e/0x76<br />
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.237 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.181 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d
- https://git.kernel.org/stable/c/3516f93cc63d956e1b290ae4b7bf2586074535a0
- https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d
- https://git.kernel.org/stable/c/82f2df94dac1aa9b879e74d1f82ba1b631bdc612
- https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304
- https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3
- https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d
- https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d
- https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304
- https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



