It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 5.11-rc3 | 5.11-rc3.x |
| linux / linux_kernel | 5.11-rc2 | 5.11-rc2.x |
| linux / linux_kernel | 5.11-rc1 | 5.11-rc1.x |
| linux / linux_kernel | 5.5 | 5.10.16 |
| linux / linux_kernel | 4.20 | 5.4.98 |
| linux / linux_kernel | 5.11-rc4 | 5.11-rc4.x |
| linux / linux_kernel | 5.11-rc5 | 5.11-rc5.x |
| linux / linux_kernel | 5.11-rc6 | 5.11-rc6.x |
| linux / linux_kernel | 5.11-rc7 | 5.11-rc7.x |
| canonical / ubuntu_linux | 14.04 | 14.04.x |
| canonical / ubuntu_linux | 16.04 | 16.04.x |
| canonical / ubuntu_linux | 18.04 | 18.04.x |
| fedoraproject / fedora | 34 | 34.x |
| redhat / enterprise_linux | 8.0 | 8.0.x |
| linux / linux_kernel | 4.14.115 | 4.14.308 |
| linux / linux_kernel | 4.15 | 4.19.206 |