Bug 2000457 (CVE-2021-34866) - CVE-2021-34866 kernel: eBPF verification flaw
Summary: CVE-2021-34866 kernel: eBPF verification flaw
Keywords:
Status: NEW
Alias: CVE-2021-34866
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2004731 2004732 2004733
Blocks: 1997324 2014625
TreeView+ depends on / blocked
 
Reported: 2021-09-02 08:00 UTC by Dhananjay Arunesh
Modified: 2024-02-08 16:50 UTC (History)
39 users (show)

Fixed In Version: Kernel 5.14
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in Linux Kernel, where a type confusion problem in check_map_func_compatibility() may lead to free arbitrary kernel memory.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:0724 0 None None None 2024-02-07 16:33:15 UTC

Description Dhananjay Arunesh 2021-09-02 08:00:28 UTC
A vulnerability was found in Linux Kernel, where a type confusion problem in check_map_func_compatibility() may lead to free arbitrary kernel memory.

Reference:
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://www.zerodayinitiative.com/advisories/ZDI-21-1148/

Comment 21 errata-xmlrpc 2024-02-07 16:33:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0724 https://access.redhat.com/errata/RHSA-2024:0724


Note You need to log in before you can comment on or make changes to this bug.