CVE-2023-52447

In the Linux kernel, the following vulnerability has been resolved: bpf: Defer the free of inner map when necessary When updating or deleting an inner map in map array or map htab, the map may still be accessed by non-sleepable program or sleepable program. However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map directly through bpf_map_put(), if the ref-counter is the last one (which is true for most cases), the inner map will be freed by ops->map_free() in a kworker. But for now, most .map_free() callbacks don't use synchronize_rcu() or its variants to wait for the elapse of a RCU grace period, so after the invocation of ops->map_free completes, the bpf program which is accessing the inner map may incur use-after-free problem. Fix the free of inner map by invoking bpf_map_free_deferred() after both one RCU grace period and one tasks trace RCU grace period if the inner map has been removed from the outer map before. The deferment is accomplished by using call_rcu() or call_rcu_tasks_trace() when releasing the last ref-counter of bpf map. The newly-added rcu_head field in bpf_map shares the same storage space with work field to reduce the size of bpf_map.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:39

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6 - Patch () https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6 - Patch
References () https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0 - Patch () https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0 - Patch
References () https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368 - Patch () https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368 - Patch
References () https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2 - Patch () https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2 - Patch
References () https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5 - Patch () https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5 - Patch
References () https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee - Patch () https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee - Patch

04 Nov 2024, 13:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'tags': ['Mailing List', 'Third Party Advisory'], 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

07 Oct 2024, 17:46

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 6.7

26 Aug 2024, 16:06

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6 - () https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6 - Patch
References () https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2 - () https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List, Third Party Advisory

25 Jun 2024, 22:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -

27 Mar 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6 -
  • () https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2 -

14 Mar 2024, 19:46

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0 - () https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0 - Patch
References () https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368 - () https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368 - Patch
References () https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5 - () https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5 - Patch
References () https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee - () https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee - Patch
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

22 Feb 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-22 17:15

Updated : 2024-11-21 08:39


NVD link : CVE-2023-52447

Mitre link : CVE-2023-52447

CVE.ORG link : CVE-2023-52447


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free