In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htablockbucket() to userspace In _htabmaplookupanddeletebatch() if htablockbucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucketcnt is greater than bucketsize or zero. Fixing it by stopping batch operation and returning -EBUSY when htablockbucket() fails, and the application can retry or skip the busy batch as needed.