In the Linux kernel, the following vulnerability has been resolved:
bpf: Add schedule points in batch ops
syzbot reported various soft lockups caused by bpf batch operations.
INFO: task kworker/1:1:27 blocked for more than 140 seconds.
INFO: task hung in rcu_barrier
Nothing prevents batch ops to process huge amount of data,
we need to add schedule points in them.
Note that maybe_wait_bpf_programs(map) calls from
generic_map_delete_batch() can be factorized by moving
the call after the loop.
This will be done later in -next tree once we get this fix merged,
unless there is strong opinion doing this optimization sooner.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-08-22 04:15
Updated : 2024-08-22 19:02
NVD link : CVE-2022-48939
Mitre link : CVE-2022-48939
CVE.ORG link : CVE-2022-48939
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-834
Excessive Iteration