{"id":"CVE-2023-54033","summary":"bpf: fix a memory leak in the LRU and LRU_PERCPU hash maps","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: fix a memory leak in the LRU and LRU_PERCPU hash maps\n\nThe LRU and LRU_PERCPU maps allocate a new element on update before locking the\ntarget hash table bucket. Right after that the maps try to lock the bucket.\nIf this fails, then maps return -EBUSY to the caller without releasing the\nallocated element. This makes the element untracked: it doesn't belong to\neither of free lists, and it doesn't belong to the hash table, so can't be\nre-used; this eventually leads to the permanent -ENOMEM on LRU map updates,\nwhich is unexpected. Fix this by returning the element to the local free list\nif bucket locking fails.","modified":"2026-03-20T12:33:24.681222Z","published":"2025-12-24T10:56:00.579Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54033.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1a9e80f757bbb1562d82e350afce2bb2f712cc3d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/79ea1a12fb9a8275b6e19d4ca625dd872dedcbb9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/965e9cccbe6b9c7b379908cebcb5e3a47f20dd5e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b34ffb0c6d23583830f9327864b9c1f486003305"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54033.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54033"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"20b6cc34ea74b6a84599c1f8a70f3315b56a1883"},{"fixed":"79ea1a12fb9a8275b6e19d4ca625dd872dedcbb9"},{"fixed":"1a9e80f757bbb1562d82e350afce2bb2f712cc3d"},{"fixed":"965e9cccbe6b9c7b379908cebcb5e3a47f20dd5e"},{"fixed":"b34ffb0c6d23583830f9327864b9c1f486003305"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54033.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.115"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.31"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.3.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54033.json"}}],"schema_version":"1.7.5"}