Hide Forgot
A security flaw was found in the Linux kernel in the adjust_scalar_min_max_vals() function in kernel/bpf/verifier.c. A faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because this function mishandles 32-bit right shifts. A local unprivileged user cannot leverage this flaw, but as a privileged user ("root") this can lead to a system panic and a denial of service or other unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely. References: https://bugs.chromium.org/p/project-zero/issues/detail?id=1686 https://seclists.org/oss-sec/2018/q4/69 An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b799207e1e1816b09e7a5920fbb2d5fcf6edd681
Note: A local unprivileged user cannot leverage this flaw, as in the Red Hat Enterprise Linux eBPF-related operations are allowed for the privileged user ("root") only.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0514 https://access.redhat.com/errata/RHSA-2019:0514
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0512 https://access.redhat.com/errata/RHSA-2019:0512