Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52447
HistoryFeb 22, 2024 - 12:00 a.m.

CVE-2023-52447

2024-02-2200:00:00
ubuntu.com
ubuntu.com
8
linux
kernel
vulnerability
bpf
map
free
rcu
grace period

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: bpf:
Defer the free of inner map when necessary When updating or deleting an
inner map in map array or map htab, the map may still be accessed by
non-sleepable program or sleepable program. However bpf_map_fd_put_ptr()
decreases the ref-counter of the inner map directly through bpf_map_put(),
if the ref-counter is the last one (which is true for most cases), the
inner map will be freed by ops->map_free() in a kworker. But for now, most
.map_free() callbacks don’t use synchronize_rcu() or its variants to wait
for the elapse of a RCU grace period, so after the invocation of
ops->map_free completes, the bpf program which is accessing the inner map
may incur use-after-free problem. Fix the free of inner map by invoking
bpf_map_free_deferred() after both one RCU grace period and one tasks trace
RCU grace period if the inner map has been removed from the outer map
before. The deferment is accomplished by using call_rcu() or
call_rcu_tasks_trace() when releasing the last ref-counter of bpf map. The
newly-added rcu_head field in bpf_map shares the same storage space with
work field to reduce the size of bpf_map.

Notes

Author Note
Priority reason: Reported by Google kCTF
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.

References

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%