libbpf 0.6.0 and 0.6.1 has a heap-based buffer overflow (8 bytes) in __bpf_object__open (called from bpf_object__open_mem and bpf-object-fuzzer.c).
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957 | Exploit Issue Tracking Third Party Advisory |
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1576.yaml | Exploit Third Party Advisory |
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957 | Exploit Issue Tracking Third Party Advisory |
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1576.yaml | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=40957 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libbpf/OSV-2021-1576.yaml - Exploit, Third Party Advisory |
Information
Published : 2022-01-01 01:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45941
Mitre link : CVE-2021-45941
CVE.ORG link : CVE-2021-45941
JSON object : View
Products Affected
libbpf_project
- libbpf
CWE
CWE-787
Out-of-bounds Write