Bugzilla – Bug 1194248
VUL-0: CVE-2021-45940: libbpf: heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
Last modified: 2023-01-11 12:06:30 UTC
CVE-2021-45940 libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (4 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c). References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45940 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40868 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1562.yaml http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45940
This is interesting: libbpf[1]> grep SUSE:SLE SUSE:SLE-15-SP3:GA libbpf SUSE:SLE-15-SP4:GA libbpf libbpf[1]> isc ls SUSE:SLE-15-SP3:GA/libbpf libbpf.changes libbpf.spec libbpf[0]> isc ls SUSE:SLE-15-SP4:GA/libbpf baselibs.conf libbpf-0.5.0.tar.gz libbpf.changes libbpf.spec libbpf[0]> How could that happen that there is just .spec and .changes?
Removing wrong needinfo.
(In reply to Petr Gajdos from comment #1) > This is interesting: Not really. BuildRequires: kernel-source is the difference.
Fix is now merged upstream https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?h=for-next&id=51deedc9b8680953437dfe359e5268120de10e30, the same fix needed for bug 1194249. This only affects Tumbleweed/Factory. I'll apply the fix there.
Fix submitted to Tumbleweed/Factory in SR#1034423. Reassigning back to security team.