CVE-2021-38300

arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 11 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:16

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/09/15/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/09/15/5 - Mailing List, Patch, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 - Mailing List, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 - Mailing List, Vendor Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b - Exploit, Mailing List, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b - Exploit, Mailing List, Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20211008-0003/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20211008-0003/ - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory

06 Apr 2022, 14:55

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*
References (DEBIAN) https://www.debian.org/security/2022/dsa-5096 - (DEBIAN) https://www.debian.org/security/2022/dsa-5096 - Third Party Advisory
References (CONFIRM) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b - (CONFIRM) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b - Exploit, Mailing List, Patch, Vendor Advisory
References (CONFIRM) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 - (CONFIRM) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 - Mailing List, Vendor Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20211008-0003/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20211008-0003/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html - Third Party Advisory

10 Mar 2022, 17:42

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2022/dsa-5096 -
  • (MLIST) https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html -

12 Oct 2021, 01:15

Type Values Removed Values Added
Summary arch/mips/net/bpf_jit.c in the Linux kernel through 5.14.6 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture. arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.
References
  • (CONFIRM) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b -
  • (CONFIRM) https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 -

08 Oct 2021, 15:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20211008-0003/ -

29 Sep 2021, 03:06

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 7.8
References (MISC) http://www.openwall.com/lists/oss-security/2021/09/15/5 - (MISC) http://www.openwall.com/lists/oss-security/2021/09/15/5 - Mailing List, Patch, Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

20 Sep 2021, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-20 06:15

Updated : 2024-11-21 06:16


NVD link : CVE-2021-38300

Mitre link : CVE-2021-38300

CVE.ORG link : CVE-2021-38300


JSON object : View

Products Affected

netapp

  • h700s_firmware
  • h300s_firmware
  • h300e_firmware
  • h410s
  • h300e
  • h700s
  • h500e_firmware
  • h500e
  • h700e
  • h300s
  • h410c
  • h410c_firmware
  • cloud_backup
  • h500s
  • h500s_firmware
  • h700e_firmware
  • h410s_firmware

debian

  • debian_linux

linux

  • linux_kernel