Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Privilege escalation |
|
Description |
+ |
An out-of-bounds access flaw was found in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. |
|
References |
+ |
https://bugzilla.redhat.com/show_bug.cgi?id=1923816 |
+ |
https://www.zerodayinitiative.com/advisories/ZDI-21-101/ |
+ |
https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444 |
|
Notes |
+ |
The issue only affects 32-bit architectures. |
|