Description
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
Apply or update to a kernel that contains the commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero").
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2785-1 | linux-4.19 security update |
EUVD |
EUVD-2021-26770 | The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101. |
Ubuntu USN |
USN-4887-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-16T17:27:58.788Z
Reserved: 2021-03-16T00:00:00.000Z
Link: CVE-2021-3444
No data.
Status : Modified
Published: 2021-03-23T18:15:13.627
Modified: 2024-11-21T06:21:32.220
Link: CVE-2021-3444
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN