First published: Tue Feb 02 2021(Updated: )
A flaw was found in the Linux kernel. Improper Input Validation in the handling of eBPF programs may lead to privilege escalation. References: <a href="https://www.zerodayinitiative.com/advisories/ZDI-21-101/">https://www.zerodayinitiative.com/advisories/ZDI-21-101/</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.10.10 | 5.10.10 |
Linux Kernel | <5.10.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
If loading of BPF programs by unprivileged users is not needed, set the following sysctl, or disable it permanently in /etc/sysctl.d/: kernel.unprivileged_bpf_disabled = 1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20268 has been classified with a high severity rating due to its potential for privilege escalation.
To remediate CVE-2021-20268, update the Linux kernel to versions 5.10.10 or newer for Red Hat or the specified patched versions for Debian.
CVE-2021-20268 affects multiple Linux distributions including Red Hat and Debian versions prior to the specified patched releases.
CVE-2021-20268 is an improper input validation vulnerability in the handling of eBPF programs within the Linux kernel.
Exploitation of CVE-2021-20268 typically requires local access to the system, suggesting it is not directly exploitable remotely.