First published: Mon Jan 17 2022(Updated: )
A flaw was found in the Linux kernel. There is an address leakage in BPF atomic fetch. This allows a local user with the ability to insert EBPF rules to be able to gather additional information for further attacks on the kernel. Reference and upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=7d3baf0afa3aa9102d6a521a8e4c41888bb79882">https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=7d3baf0afa3aa9102d6a521a8e4c41888bb79882</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <5.16 | |
Linux Linux kernel | =5.16 | |
Linux Linux kernel | =5.16-rc1 | |
Linux Linux kernel | =5.16-rc2 | |
Linux Linux kernel | =5.16-rc3 | |
Linux Linux kernel | =5.16-rc4 | |
Linux Linux kernel | =5.16-rc5 | |
redhat/kernel | <5.16 | 5.16 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.