CVE-2023-52621
In the Linux kernel, the following vulnerability has been resolved: bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers These three bpf_map_{lookup,update,delete}_elem() helpers are also available for sleepable bpf program, so add the corresponding lock assertion for sleepable bpf program, otherwise the following warning will be reported when a sleepable bpf program manipulates bpf map under interpreter mode (aka bpf_jit_enable=0): WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 …… CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) …… RIP: 0010:bpf_map_lookup_elem+0x54/0x60 …… Call Trace:
Date published : 2024-03-26
https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d
https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d
