A vulnerability in the extended Berkeley Packet Filter (eBPF) verifier of the Linux Kernel could allow a local attacker to access sensitive information on a targeted system.
The vulnerability is due to improper handling of states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type by the affected software. An attacker could exploit this vulnerability to trigger a pointer leak on a targeted system. A successful exploit could allow the attacker to access sensitive address information, which could be used to conduct further attacks.
Kernel.org has confirmed the vulnerability and released a software patch.
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.