Bug 1194248 - (CVE-2021-45940) VUL-0: CVE-2021-45940: libbpf: heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
(CVE-2021-45940)
VUL-0: CVE-2021-45940: libbpf: heap-based buffer overflow (4 bytes) in __bpf_...
Status: IN_PROGRESS
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/319366/
CVSSv3.1:SUSE:CVE-2021-45940:5.1:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-01-03 15:35 UTC by Alexander Bergmann
Modified: 2022-11-08 08:08 UTC (History)
7 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2022-01-03 15:35:57 UTC
CVE-2021-45940

libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in
__bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45940
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40868
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1562.yaml
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45940
Comment 1 Petr Gajdos 2022-01-04 10:03:54 UTC
This is interesting:

libbpf[1]> grep SUSE:SLE
SUSE:SLE-15-SP3:GA                                                 libbpf
SUSE:SLE-15-SP4:GA                                                 libbpf
libbpf[1]> isc ls SUSE:SLE-15-SP3:GA/libbpf
libbpf.changes
libbpf.spec
libbpf[0]> isc ls SUSE:SLE-15-SP4:GA/libbpf
baselibs.conf
libbpf-0.5.0.tar.gz
libbpf.changes
libbpf.spec
libbpf[0]>

How could that happen that there is just .spec and .changes?
Comment 2 Petr Gajdos 2022-01-04 10:04:16 UTC
Removing wrong needinfo.
Comment 3 Petr Gajdos 2022-01-04 10:19:59 UTC
(In reply to Petr Gajdos from comment #1)
> This is interesting:

Not really. BuildRequires:  kernel-source is the difference.
Comment 11 Shung-Hsi Yu 2022-10-21 08:27:37 UTC
Fix is now merged upstream https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?h=for-next&id=51deedc9b8680953437dfe359e5268120de10e30, the same fix needed for bug 1194249.

This only affects Tumbleweed/Factory. I'll apply the fix there.
Comment 12 Shung-Hsi Yu 2022-11-08 08:08:34 UTC
Fix submitted to Tumbleweed/Factory in SR#1034423.
Reassigning back to security team.