Bug 2106098 (CVE-2021-39711) - CVE-2021-39711 kernel: out-of-bounds read due to Incorrect size value in bpf_prog_test_run_skb() of test_run.c
Summary: CVE-2021-39711 kernel: out-of-bounds read due to Incorrect size value in bpf_...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2021-39711
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2106100
TreeView+ depends on / blocked
 
Reported: 2022-07-11 18:57 UTC by Guilherme de Almeida Suckevicz
Modified: 2022-08-31 04:55 UTC (History)
48 users (show)

Fixed In Version: kernel 4.18 rc6
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds (OOB) read flaw was found in bpf_prog_test_run_skb in the net/bpf/test_run.c function due to an incorrect Size Value in the Linux kernel.
Clone Of:
Environment:
Last Closed: 2022-08-31 04:55:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2022-07-11 18:57:34 UTC
In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel

Reference:
https://source.android.com/security/bulletin/pixel/2022-03-01

Comment 6 Rohit Keshri 2022-08-02 19:13:38 UTC
There was no shipped kernel version that was seen affected by this problem.

Comment 7 Product Security DevOps Team 2022-08-31 04:55:50 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-39711


Note You need to log in before you can comment on or make changes to this bug.