Description
In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2785-1 | linux-4.19 security update |
EUVD |
EUVD-2021-21206 | In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack. |
Ubuntu USN |
USN-5092-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5092-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5096-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5115-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-5137-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5137-2 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T00:12:50.411Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34556
No data.
Status : Modified
Published: 2021-08-02T05:15:07.663
Modified: 2024-11-21T06:10:40.220
Link: CVE-2021-34556
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN