Bug 1974456 (CVE-2021-33624) - CVE-2021-33624 kernel: Linux kernel BPF protection against speculative execution attacks can be bypassed to read arbitrary kernel memory
Summary: CVE-2021-33624 kernel: Linux kernel BPF protection against speculative execut...
Keywords:
Status: NEW
Alias: CVE-2021-33624
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 1974457 1976848 1976849 1978299 1978300 1978301 1978302
Blocks: 1974458
TreeView+ depends on / blocked
 
Reported: 2021-06-21 18:14 UTC by Pedro Sampaio
Modified: 2023-09-19 14:13 UTC (History)
38 users (show)

Fixed In Version: kernel 5.13
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2021-06-21 18:14:42 UTC
A flaw was found in the Linux kernel's BPF subsystem in sanitize_ptr_alu in kernel/bpf/verifier.c, where protection against speculative execution attacks (Spectre mitigation) can be bypassed. The highest threat from this vulnerability is to confidentiality.

References:

https://www.openwall.com/lists/oss-security/2021/06/21/1

Comment 1 Pedro Sampaio 2021-06-21 18:15:20 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1974457]


Note You need to log in before you can comment on or make changes to this bug.