Bug 2043383 (CVE-2021-45940)

Summary: CVE-2021-45940 libbpf: heap-based buffer overflow (4 bytes) in __bpf_object__open
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: ckalina
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in libbpf. The vulnerability occurs due to incorrect handling of memory in the __bpf_object__open function and leads to a heap-buffer-overflow. This flaw allows an attacker to execute unauthorized code or commands, read memory, or modify memory.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2043384, 2051966, 2051967    
Bug Blocks: 2043392    

Description Sandipan Roy 2022-01-21 07:01:56 UTC
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

Ref: 
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40868
https://bugzilla.suse.com/1194248

Comment 1 Sandipan Roy 2022-01-21 07:02:12 UTC
Created libbpf tracking bugs for this issue:

Affects: fedora-all [bug 2043384]