{"id":"CVE-2023-52621","summary":"bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check rcu_read_lock_trace_held() before calling bpf map helpers\n\nThese three bpf_map_{lookup,update,delete}_elem() helpers are also\navailable for sleepable bpf program, so add the corresponding lock\nassertion for sleepable bpf program, otherwise the following warning\nwill be reported when a sleepable bpf program manipulates bpf map under\ninterpreter mode (aka bpf_jit_enable=0):\n\n  WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......\n  CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......\n  RIP: 0010:bpf_map_lookup_elem+0x54/0x60\n  ......\n  Call Trace:\n   \u003cTASK\u003e\n   ? __warn+0xa5/0x240\n   ? bpf_map_lookup_elem+0x54/0x60\n   ? report_bug+0x1ba/0x1f0\n   ? handle_bug+0x40/0x80\n   ? exc_invalid_op+0x18/0x50\n   ? asm_exc_invalid_op+0x1b/0x20\n   ? __pfx_bpf_map_lookup_elem+0x10/0x10\n   ? rcu_lockdep_current_cpu_online+0x65/0xb0\n   ? rcu_is_watching+0x23/0x50\n   ? bpf_map_lookup_elem+0x54/0x60\n   ? __pfx_bpf_map_lookup_elem+0x10/0x10\n   ___bpf_prog_run+0x513/0x3b70\n   __bpf_prog_run32+0x9d/0xd0\n   ? __bpf_prog_enter_sleepable_recur+0xad/0x120\n   ? __bpf_prog_enter_sleepable_recur+0x3e/0x120\n   bpf_trampoline_6442580665+0x4d/0x1000\n   __x64_sys_getpgid+0x5/0x30\n   ? do_syscall_64+0x36/0xb0\n   entry_SYSCALL_64_after_hwframe+0x6e/0x76\n   \u003c/TASK\u003e","modified":"2026-04-02T09:43:08.073432Z","published":"2024-03-26T17:19:23.208Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1490-1","USN-6818-2","USN-6819-2"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52621.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3516f93cc63d956e1b290ae4b7bf2586074535a0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82f2df94dac1aa9b879e74d1f82ba1b631bdc612"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52621.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52621"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1e6c62a8821557720a9b2ea9617359b264f2f67c"},{"fixed":"82f2df94dac1aa9b879e74d1f82ba1b631bdc612"},{"fixed":"3516f93cc63d956e1b290ae4b7bf2586074535a0"},{"fixed":"d6d6fe4bb105595118f12abeed4a7bdd450853f3"},{"fixed":"483cb92334cd7f1d5387dccc0ab5d595d27a669d"},{"fixed":"c7f1b6146f4a46d727c0d046284c28b6882c6304"},{"fixed":"169410eba271afc9f0fb476d996795aa26770c6d"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52621.json"}}],"schema_version":"1.7.5"}