arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/09/15/5 | Mailing List Patch Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10 | Mailing List Vendor Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b | Exploit Mailing List Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20211008-0003/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5096 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-09-20T05:25:30
Updated: 2022-03-10T02:07:07
Reserved: 2021-08-09T00:00:00
Link: CVE-2021-38300
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-09-20T06:15:06.623
Modified: 2023-03-01T20:15:51.363
Link: CVE-2021-38300
JSON object: View
Redhat Information
No data.
CWE