Total vulnerabilities in the database
The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 5.5.0 | 5.10.19 |
linux / linux_kernel | 5.11 | 5.11.2 |
linux / linux_kernel | - | 5.4.101 |
debian / debian_linux | 9.0 | 9.0.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 20.04 | 20.04.x |