Name | CVE-2021-38300 |
Description | arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2941-1, DSA-5096-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
linux (PTS) | bullseye | 5.10.223-1 | fixed |
| bullseye (security) | 5.10.226-1 | fixed |
| bookworm | 6.1.115-1 | fixed |
| bookworm (security) | 6.1.119-1 | fixed |
| sid, trixie | 6.12.5-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - linux <ignored> (mips not supported in LTS)
https://www.openwall.com/lists/oss-security/2021/09/15/5
https://lore.kernel.org/bpf/20210915160437.4080-1-piotras@gmail.com/