In the Linux kernel, the following vulnerability has been resolved:
bpf: Propagate error from htablockbucket() to userspace
In _htabmaplookupanddeletebatch() if htablockbucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucketcnt is greater than bucketsize or zero.
Fixing it by stopping batch operation and returning -EBUSY when htablockbucket() fails, and the application can retry or skip the busy batch as needed.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50490.json"
}