A flaw was found in the Linux kernel's eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | kernel | 2021-05-20 21:12 | ALAS-2021-1503 |
Amazon Linux 2 - Core | kernel | 2021-05-20 15:51 | ALAS2-2021-1636 |
Amazon Linux 2 - Kernel-5.10 Extra | kernel | 2022-01-20 23:18 | ALAS2KERNEL-5.10-2022-001 |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2022-01-12 00:00 | ALAS2KERNEL-5.4-2022-003 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.2 | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
NVD | CVSSv3 | 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
NVD | CVSSv2 | 2.1 | AV:L/AC:L/Au:N/C:P/I:N/A:N |