USN-5759-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-5759-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5759-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5759-2
Related
Published
2022-12-08T09:40:00.521898Z
Modified
2022-12-08T09:40:00.521898Z
Summary
libbpf vulnerabilities
Details

USN-5759-1 fixed vulnerabilities in LibBPF. This update provides the corresponding updates for Ubuntu 20.04 ESM.

Original advisory details:

It was discovered that LibBPF incorrectly handled certain memory operations under certain circumstances. An attacker could possibly use this issue to cause LibBPF to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 22.10. (CVE-2021-45940, CVE-2021-45941, CVE-2022-3533)

It was discovered that LibBPF incorrectly handled certain memory operations under certain circumstances. An attacker could possibly use this issue to cause LibBPF to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-3534, CVE-2022-3606)

References

Affected packages

Ubuntu:Pro:20.04:LTS / libbpf

Package

Name
libbpf
Purl
pkg:deb/ubuntu/libbpf?arch=src?distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.0-1~ubuntu20.04.1+esm1

Affected versions

0.*

0.5.0-1~ubuntu20.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "1:0.5.0-1~ubuntu20.04.1+esm1",
            "binary_name": "libbpf-dev"
        },
        {
            "binary_version": "1:0.5.0-1~ubuntu20.04.1+esm1",
            "binary_name": "libbpf0"
        },
        {
            "binary_version": "1:0.5.0-1~ubuntu20.04.1+esm1",
            "binary_name": "libbpf0-dbgsym"
        }
    ]
}