Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-29154

Опубликовано: 08 апр. 2021
Источник: debian
EPSS Низкий

Описание

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.10.28-1package
linuxfixed4.19.194-1busterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/04/08/1

EPSS

Процентиль: 7%
0.00029
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

CVSS3: 7
redhat
больше 4 лет назад

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

CVSS3: 7.8
nvd
больше 4 лет назад

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

CVSS3: 7.8
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.8
github
больше 3 лет назад

Incorrect computation of branch displacements in BPF JIT compilers the Linux kernel can be abused to execute arbitrary code in Kernel mode.

EPSS

Процентиль: 7%
0.00029
Низкий