Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-29154

Опубликовано: 08 апр. 2021
Источник: debian
EPSS Низкий

Описание

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.10.28-1package
linuxfixed4.19.194-1busterpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/04/08/1

EPSS

Процентиль: 12%
0.0004
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 4 лет назад

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

CVSS3: 7
redhat
около 4 лет назад

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

CVSS3: 7.8
nvd
около 4 лет назад

BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.

CVSS3: 7.8
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 7.8
github
около 3 лет назад

Incorrect computation of branch displacements in BPF JIT compilers the Linux kernel can be abused to execute arbitrary code in Kernel mode.

EPSS

Процентиль: 12%
0.0004
Низкий