A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2021-4159 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2036024 | Issue Tracking |
https://security-tracker.debian.org/tracker/CVE-2021-4159 | Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd | Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | Mailing List Third Party Advisory |
Information
Published : 2022-08-24 09:15
Updated : 2022-10-06 08:30
NVD link : CVE-2021-4159
Mitre link : CVE-2021-4159
JSON object : View
CWE
Products Affected
redhat
- enterprise_linux
debian
- debian_linux
linux
- linux_kernel