ALT-PU-2021-3434-1
Package kernel-image-std-debug updated to version 5.10.83-alt1 for branch sisyphus in task 291066.
Closed vulnerabilities
Published: 2021-11-09
BDU:2022-05887
Уязвимость верификатора ebpf компонента bpf_map_update_elem и bpf_map_freeze (kernel/bpf/syscall.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных
Severity: MEDIUM (4.1)
Vector: AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
References:
Published: 2022-01-21
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-4001
A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.
Severity: MEDIUM (4.1)
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=2025645
- https://bugzilla.redhat.com/show_bug.cgi?id=2025645
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53
- https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=353050be4c19e102178ccc05988101887c25ae53