A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.
When trying to keep information confidential, an attacker can often infer some of the information by using statistics.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2036024 | issue tracking |
https://access.redhat.com/security/cve/CVE-2021-4159 | third party advisory |
https://security-tracker.debian.org/tracker/CVE-2021-4159 | third party advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd | mailing list patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html | third party advisory mailing list |