CVE-2023-52621Reachable Assertion in Linux

Severity
7.8HIGHNVD
OSV8.8OSV7.5OSV6.5
EPSS
0.0%
top 99.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 26
Latest updateJan 20

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These three bpf_map_{lookup,update,delete}_elem() helpers are also available for sleepable bpf program, so add the corresponding lock assertion for sleepable bpf program, otherwise the following warning will be reported when a sleepable bpf program manipulates bpf map under interpreter mode (aka bpf_jit_enable=0): WARNING: CPU: 3 PID: 4985 at kernel/bpf/help

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

NVDlinux/linux_kernel5.105.10.237+4
Debianlinux/linux_kernel< 5.10.237-1+3
Ubuntulinux/linux_kernel< 5.15.0-127.137
CVEListV5linux/linux1e6c62a8821557720a9b2ea9617359b264f2f67c82f2df94dac1aa9b879e74d1f82ba1b631bdc612+6

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

18
OSV
linux-xilinx-zynqmp vulnerabilities2025-01-20
OSV
linux-azure, linux-intel-iotg-5.15 vulnerabilities2025-01-09
OSV
linux-azure-5.15 vulnerabilities2025-01-09
OSV
linux-intel-iotg vulnerabilities2025-01-06
OSV
linux-hwe-5.15 vulnerabilities2024-12-20

📋Vendor Advisories

18
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2025-01-20
Ubuntu
Linux kernel vulnerabilities2025-01-09
Ubuntu
Linux kernel (Azure) vulnerabilities2025-01-09
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2025-01-06
Ubuntu
Linux kernel (HWE) vulnerabilities2024-12-20

💬Community

1
Bugzilla
CVE-2023-52621 kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers2024-03-26