Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Propagate error from htab_lock_bucket() to userspace In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns -EBUSY, it will go to next bucket. Going to next bucket may not only skip the elements in current bucket silently, but also incur out-of-bound memory access or expose kernel memory to userspace if current bucket_cnt is greater than bucket_size or zero. Fixing it by stopping batch operation and returning -EBUSY when htab_lock_bucket() fails, and the application can retry or skip the busy batch as needed.
References (4)
Core 4
Core References
Scores
CVSS v3
7.1
EPSS
0.0001
EPSS Percentile
1.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (14)
linux/Kernel
5.11.0 - 5.15.75linux
linux/Kernel
5.16.0 - 5.19.17linux
linux/Kernel
5.20.0 - 6.0.3linux
Linux/Linux
< 5.11
Linux/Linux
20b6cc34ea74b6a84599c1f8a70f3315b56a1883 - 0e13425104903970a5ede853082d3bbb4edec6f3
Linux/Linux
20b6cc34ea74b6a84599c1f8a70f3315b56a1883 - 4f1f39a8f1ce1b24fee6852d7dcd704ce7c4334d
Linux/Linux
20b6cc34ea74b6a84599c1f8a70f3315b56a1883 - 66a7a92e4d0d091e79148a4c6ec15d1da65f4280
Linux/Linux
20b6cc34ea74b6a84599c1f8a70f3315b56a1883 - 6bfee6eb3d6b96ae730a542909dd22b5f9f50d58
Linux/Linux
5.11
Linux/Linux
5.15.75 - 5.15.*
... and 4 more
Published
Oct 04, 2025
Tracked Since
Feb 18, 2026