Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-45940

Опубликовано: 01 янв. 2022
Источник: redhat
CVSS3: 4.5
EPSS Низкий

Описание

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

A flaw was found in libbpf. The vulnerability occurs due to incorrect handling of memory in the __bpf_object__open function and leads to a heap-buffer-overflow. This flaw allows an attacker to execute unauthorized code or commands, read memory, or modify memory.

Отчет

The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF.That means to exploit this vulnerability it would require a privileged user with CAP_SYS_ADMIN or root making the severity of this vulnerability as low.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8libbpfWill not fix
Red Hat Enterprise Linux 9libbpfNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-120->CWE-131
https://bugzilla.redhat.com/show_bug.cgi?id=2043383libbpf: heap-based buffer overflow (4 bytes) in __bpf_object__open

EPSS

Процентиль: 37%
0.00159
Низкий

4.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 4 лет назад

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

CVSS3: 6.5
nvd
около 4 лет назад

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

CVSS3: 6.5
debian
около 4 лет назад

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in _ ...

github
около 4 лет назад

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

EPSS

Процентиль: 37%
0.00159
Низкий

4.5 Medium

CVSS3