arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
|
History
21 Nov 2024, 06:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/09/15/5 - Mailing List, Patch, Third Party Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 - Mailing List, Vendor Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b - Exploit, Mailing List, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20211008-0003/ - Third Party Advisory | |
References | () https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory |
06 Apr 2022, 14:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:* |
|
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory | |
References | (CONFIRM) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b - Exploit, Mailing List, Patch, Vendor Advisory | |
References | (CONFIRM) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 - Mailing List, Vendor Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20211008-0003/ - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Third Party Advisory |
10 Mar 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Oct 2021, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture. | |
References |
|
08 Oct 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Sep 2021, 03:06
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
References | (MISC) http://www.openwall.com/lists/oss-security/2021/09/15/5 - Mailing List, Patch, Third Party Advisory | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
20 Sep 2021, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-20 06:15
Updated : 2024-11-21 06:16
NVD link : CVE-2021-38300
Mitre link : CVE-2021-38300
CVE.ORG link : CVE-2021-38300
JSON object : View
Products Affected
netapp
- h700s_firmware
- h300s_firmware
- h300e_firmware
- h410s
- h300e
- h700s
- h500e_firmware
- h500e
- h700e
- h300s
- h410c
- h410c_firmware
- cloud_backup
- h500s
- h500s_firmware
- h700e_firmware
- h410s_firmware
debian
- debian_linux
linux
- linux_kernel
CWE