Hide Forgot
A flaw was found in the Linux kernel. Improper Input Validation in the handling of eBPF programs may lead to privilege escalation. References: https://www.zerodayinitiative.com/advisories/ZDI-21-101/
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1923817]
This was fixed for Fedora with the 5.10.10 stable kernel updates.
Statement: This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.
Hi Could you point to the upstream commit which fixed this issue? The refernced discussion / proposed patch was not applied as such in the 5.10.y series afaics.
Okay I suspect this is https://git.kernel.org/linus/bc895e8b2a64e502fbba72748d59618272052a8b ?
Mitigation: As a temporary solution, set the following sysctl: kernel.unprivileged_bpf_disabled = 1
In reply to comment #13: > Hi > > Could you point to the upstream commit which fixed this issue? > > The refernced discussion / proposed patch was not applied as such in the > 5.10.y series afaics. The patch is https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444 (similar to previously provided link https://lkml.org/lkml/2021/1/26/735 ), and looks like not applied yet for the upstream (at least cannot find it with https://git.kernel.org/ ).
External References: https://lore.kernel.org/bpf/CACAyw99bEYWJCSGqfLiJ9Jp5YE1ZsZSiJxb4RFUTwbofipf0dA@mail.gmail.com/T/#m8929643e99bea9c18ed490a7bc2591145eac6444