Updated: 2024-11-24 04:19:57.981128
Description:
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
Links | NIST | CIRCL | RHEL | Ubuntu |
Severity | Score | |
---|---|---|
CVSS Version 2.x | MEDIUM | 4.6000000000000005 |
CVSS Version 3.x | HIGH | 7.8 |
OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
---|---|---|---|---|---|---|---|---|
CentOS 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Not Vulnerable | 2021-12-09 07:57:26 | ||
CentOS 7 ELS | kernel | 3.10.0 | 7.8 | HIGH | Not Vulnerable | 2024-07-01 10:21:20 | ||
CentOS 8.4 ELS | kernel | 4.18.0 | 7.8 | HIGH | Ignored | 2022-02-15 12:04:35 | ||
CentOS 8.5 ELS | kernel | 4.18.0 | 7.8 | HIGH | Ignored | 2022-02-21 05:39:36 | ||
CloudLinux 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Not Vulnerable | 2022-03-30 18:51:02 | ||
Oracle Linux 6 ELS | kernel | 2.6.32 | 7.8 | HIGH | Not Vulnerable | 2022-03-30 18:51:02 | ||
Ubuntu 16.04 ELS | linux | 4.4.0 | 7.8 | HIGH | Not Vulnerable | 2022-02-17 08:55:51 | ||
Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 7.8 | HIGH | Already Fixed | 2022-09-28 03:36:16 | ||
Ubuntu 18.04 ELS | linux | 4.15.0 | 7.8 | HIGH | Not Vulnerable | 2023-08-28 21:18:51 |