Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-34556

Опубликовано: 02 авг. 2021
Источник: debian
EPSS Низкий

Описание

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.10.46-4package
linuxfixed4.19.208-1busterpackage
linuxignoredstretchpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2021/08/01/3

EPSS

Процентиль: 13%
0.00043
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 4 лет назад

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

CVSS3: 4.4
redhat
больше 4 лет назад

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

CVSS3: 5.5
nvd
больше 4 лет назад

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

CVSS3: 5.5
msrc
больше 4 лет назад

In the Linux kernel through 5.13.7 an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

github
больше 3 лет назад

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

EPSS

Процентиль: 13%
0.00043
Низкий