CVE-2023-52621 — Reachable Assertion in Linux
Severity
7.8HIGHNVD
OSV8.8OSV7.5OSV6.5
EPSS
0.0%
top 99.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 26
Latest updateJan 20
Description
In the Linux kernel, the following vulnerability has been resolved:
bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers
These three bpf_map_{lookup,update,delete}_elem() helpers are also
available for sleepable bpf program, so add the corresponding lock
assertion for sleepable bpf program, otherwise the following warning
will be reported when a sleepable bpf program manipulates bpf map under
interpreter mode (aka bpf_jit_enable=0):
WARNING: CPU: 3 PID: 4985 at kernel/bpf/help…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages6 packages
▶CVEListV5linux/linux1e6c62a8821557720a9b2ea9617359b264f2f67c — 82f2df94dac1aa9b879e74d1f82ba1b631bdc612+6
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
18📋Vendor Advisories
18💬Community
1Bugzilla▶
CVE-2023-52621 kernel: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers↗2024-03-26