Description
kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2690-1 | linux-4.19 security update |
EUVD |
EUVD-2021-18704 | kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel. |
Ubuntu USN |
USN-4983-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-4997-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4997-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-4999-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5000-2 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5018-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:10:30.728Z
Reserved: 2021-04-27T00:00:00.000Z
Link: CVE-2021-31829
No data.
Status : Modified
Published: 2021-05-06T16:15:07.493
Modified: 2024-11-21T06:06:18.613
Link: CVE-2021-31829
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN