Buffer Overflow vulnerability in libbpf 1.5.0 allows a local attacker to execute arbitrary code via the bpfobjectinitprog` function of libbpf.
{ "binaries": [ { "binary_name": "dwarves", "binary_version": "1.10-2.1" } ] }
{ "binaries": [ { "binary_name": "dwarves", "binary_version": "1.21-0ubuntu1~18.04.1+esm1" } ] }
{ "binaries": [ { "binary_name": "dwarves", "binary_version": "1.21-0ubuntu1~20.04.1" } ] }
{ "binaries": [ { "binary_name": "libbpf-dev", "binary_version": "1:0.5.0-1~ubuntu20.04.1+esm1" }, { "binary_name": "libbpf0", "binary_version": "1:0.5.0-1~ubuntu20.04.1+esm1" } ] }
{ "binaries": [ { "binary_name": "libbpf-dev", "binary_version": "1:0.5.0-1ubuntu22.04.1" }, { "binary_name": "libbpf0", "binary_version": "1:0.5.0-1ubuntu22.04.1" } ] }
{ "binaries": [ { "binary_name": "libbpf-dev", "binary_version": "1:1.3.0-2build2" }, { "binary_name": "libbpf1", "binary_version": "1:1.3.0-2build2" } ] }
{ "binaries": [ { "binary_name": "libbpf-dev", "binary_version": "1:1.5.0-2" }, { "binary_name": "libbpf1", "binary_version": "1:1.5.0-2" } ] }