Bug 2043387 (CVE-2021-45941)

Summary: CVE-2021-45941 libbpf: heap-based buffer overflow (8 bytes) in __bpf_object__open
Product: [Other] Security Response Reporter: Sandipan Roy <saroy>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ckalina
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in libbpf. The vulnerability occurs due to incorrect handling of memory in the __bpf_object__open function and leads to a heap-buffer-overflow. This flaw allows an attacker to execute unauthorized code or commands, read memory, or modify memory.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2043388, 2051974, 2051975    
Bug Blocks: 2043392    

Description Sandipan Roy 2022-01-21 07:08:42 UTC
libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957
https://bugzilla.suse.com/1194249

Comment 1 Sandipan Roy 2022-01-21 07:08:55 UTC
Created libbpf tracking bugs for this issue:

Affects: fedora-all [bug 2043388]