Buffer Overflow vulnerability in libbpf 1.5.0 allows a local attacker to execute arbitrary code via the bpfobjectinitprog` function of libbpf.
{ "binaries": [ { "binary_version": "1:0.5.0-1ubuntu22.04.1", "binary_name": "libbpf-dev" }, { "binary_version": "1:0.5.0-1ubuntu22.04.1", "binary_name": "libbpf0" } ] }
{ "binaries": [ { "binary_version": "1:1.3.0-2build2", "binary_name": "libbpf-dev" }, { "binary_version": "1:1.3.0-2build2", "binary_name": "libbpf1" } ] }
{ "binaries": [ { "binary_version": "1:1.5.0-2", "binary_name": "libbpf-dev" }, { "binary_version": "1:1.5.0-2", "binary_name": "libbpf1" } ] }
{ "binaries": [ { "binary_version": "1.10-2.1", "binary_name": "dwarves" } ] }
{ "binaries": [ { "binary_version": "1.21-0ubuntu1~18.04.1+esm1", "binary_name": "dwarves" } ] }
{ "binaries": [ { "binary_version": "1.21-0ubuntu1~20.04.1", "binary_name": "dwarves" } ] }
{ "binaries": [ { "binary_version": "1:0.5.0-1~ubuntu20.04.1+esm1", "binary_name": "libbpf-dev" }, { "binary_version": "1:0.5.0-1~ubuntu20.04.1+esm1", "binary_name": "libbpf0" } ] }