Description
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix exclusive map memory leak When excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also needs to be freed. Otherwise, the map memory will not be reclaimed, just like the memory leak problem reported by syzbot [1]. syzbot reported: BUG: memory leak backtrace (crc 7b9fb9b4): map_create+0x322/0x11e0 kernel/bpf/syscall.c:1512 __sys_bpf+0x3556/0x3610 kernel/bpf/syscall.c:6131
Product status
baefdbdf6812e120c9fba9cfb101d3656f478026 (git) before f0022551745d72fc0e7bc8601234d690dee2178d
baefdbdf6812e120c9fba9cfb101d3656f478026 (git) before 688b745401ab16e2e1a3b504863f0a45fd345638
6.18
Any version before 6.18
6.18.2 (semver)
6.19-rc1 (original_commit_for_fix)
References
git.kernel.org/...c/f0022551745d72fc0e7bc8601234d690dee2178d
git.kernel.org/...c/688b745401ab16e2e1a3b504863f0a45fd345638
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.