First published: Tue Jan 11 2022(Updated: )
An out of bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This could allow a local attacker with a special privilege to crash the system or leak kernel internal information. Reference: <a href="https://www.openwall.com/lists/oss-security/2022/01/11/4">https://www.openwall.com/lists/oss-security/2022/01/11/4</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.8.0 | |
Linux Kernel | =5.8.0 | |
Debian GNU/Linux | =11.0 | |
Red Hat Enterprise Linux | =9.0 | |
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Disable unprivileged ebpf with: sudo sysctl kernel.unprivileged_bpf_disabled=1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4204 has been classified as a medium severity vulnerability due to its potential to crash systems or leak kernel information.
To fix CVE-2021-4204, update your Linux kernel to version 5.10.223-1 or later.
CVE-2021-4204 affects Linux Kernel versions up to 5.8.0, and also specific versions of Debian Debian Linux and Red Hat Enterprise Linux.
CVE-2021-4204 can be exploited by a local attacker with special privileges on the affected system.
CVE-2021-4204 is an out of bounds memory access vulnerability caused by improper input validation in the Linux kernel's eBPF.