| { |
| "containers": { |
| "cna": { |
| "providerMetadata": { |
| "orgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038" |
| }, |
| "descriptions": [ |
| { |
| "lang": "en", |
| "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Defer the free of inner map when necessary\n\nWhen updating or deleting an inner map in map array or map htab, the map\nmay still be accessed by non-sleepable program or sleepable program.\nHowever bpf_map_fd_put_ptr() decreases the ref-counter of the inner map\ndirectly through bpf_map_put(), if the ref-counter is the last one\n(which is true for most cases), the inner map will be freed by\nops->map_free() in a kworker. But for now, most .map_free() callbacks\ndon't use synchronize_rcu() or its variants to wait for the elapse of a\nRCU grace period, so after the invocation of ops->map_free completes,\nthe bpf program which is accessing the inner map may incur\nuse-after-free problem.\n\nFix the free of inner map by invoking bpf_map_free_deferred() after both\none RCU grace period and one tasks trace RCU grace period if the inner\nmap has been removed from the outer map before. The deferment is\naccomplished by using call_rcu() or call_rcu_tasks_trace() when\nreleasing the last ref-counter of bpf map. The newly-added rcu_head\nfield in bpf_map shares the same storage space with work field to\nreduce the size of bpf_map." |
| } |
| ], |
| "affected": [ |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "unaffected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "include/linux/bpf.h", |
| "kernel/bpf/map_in_map.c", |
| "kernel/bpf/syscall.c" |
| ], |
| "versions": [ |
| { |
| "version": "bba1dc0b55ac462d24ed1228ad49800c238cd6d7", |
| "lessThan": "90c445799fd1dc214d7c6279c144e33a35e29ef2", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "bba1dc0b55ac462d24ed1228ad49800c238cd6d7", |
| "lessThan": "37d98fb9c3144c0fddf7f6e99aece9927ac8dce6", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "bba1dc0b55ac462d24ed1228ad49800c238cd6d7", |
| "lessThan": "62fca83303d608ad4fec3f7428c8685680bb01b0", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "bba1dc0b55ac462d24ed1228ad49800c238cd6d7", |
| "lessThan": "f91cd728b10c51f6d4a39957ccd56d1e802fc8ee", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "bba1dc0b55ac462d24ed1228ad49800c238cd6d7", |
| "lessThan": "bfd9b20c4862f41d4590fde11d70a5eeae53dcc5", |
| "status": "affected", |
| "versionType": "git" |
| }, |
| { |
| "version": "bba1dc0b55ac462d24ed1228ad49800c238cd6d7", |
| "lessThan": "876673364161da50eed6b472d746ef88242b2368", |
| "status": "affected", |
| "versionType": "git" |
| } |
| ] |
| }, |
| { |
| "product": "Linux", |
| "vendor": "Linux", |
| "defaultStatus": "affected", |
| "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", |
| "programFiles": [ |
| "include/linux/bpf.h", |
| "kernel/bpf/map_in_map.c", |
| "kernel/bpf/syscall.c" |
| ], |
| "versions": [ |
| { |
| "version": "5.9", |
| "status": "affected" |
| }, |
| { |
| "version": "0", |
| "lessThan": "5.9", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.10.214", |
| "lessThanOrEqual": "5.10.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "5.15.153", |
| "lessThanOrEqual": "5.15.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.1.75", |
| "lessThanOrEqual": "6.1.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.6.14", |
| "lessThanOrEqual": "6.6.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.7.2", |
| "lessThanOrEqual": "6.7.*", |
| "status": "unaffected", |
| "versionType": "semver" |
| }, |
| { |
| "version": "6.8", |
| "lessThanOrEqual": "*", |
| "status": "unaffected", |
| "versionType": "original_commit_for_fix" |
| } |
| ] |
| } |
| ], |
| "cpeApplicability": [ |
| { |
| "nodes": [ |
| { |
| "operator": "OR", |
| "negate": false, |
| "cpeMatch": [ |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.9", |
| "versionEndExcluding": "5.10.214" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.9", |
| "versionEndExcluding": "5.15.153" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.9", |
| "versionEndExcluding": "6.1.75" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.9", |
| "versionEndExcluding": "6.6.14" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.9", |
| "versionEndExcluding": "6.7.2" |
| }, |
| { |
| "vulnerable": true, |
| "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", |
| "versionStartIncluding": "5.9", |
| "versionEndExcluding": "6.8" |
| } |
| ] |
| } |
| ] |
| } |
| ], |
| "references": [ |
| { |
| "url": "https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5" |
| }, |
| { |
| "url": "https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368" |
| } |
| ], |
| "title": "bpf: Defer the free of inner map when necessary", |
| "x_generator": { |
| "engine": "bippy-1.2.0" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f4215fc3-5b6b-47ff-a258-f7189bd81038", |
| "cveID": "CVE-2023-52447", |
| "requesterUserId": "gregkh@kernel.org", |
| "serial": "1", |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |