summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-34556
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-08-02 07:38:42 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-08-02 07:38:42 +0200
commitad85247f8a465ea1c93627ba3c586db213e38c7d (patch)
treebae4ccd9c2ee48aa77d9cd554179a1c5ce80391d /active/CVE-2021-34556
parent6d314614d8a5279f676b82aaeb0621397a53012c (diff)
Add CVE-2021-34556 and CVE-2021-35477
Diffstat (limited to 'active/CVE-2021-34556')
-rw-r--r--active/CVE-2021-3455612
1 files changed, 12 insertions, 0 deletions
diff --git a/active/CVE-2021-34556 b/active/CVE-2021-34556
new file mode 100644
index 00000000..87025758
--- /dev/null
+++ b/active/CVE-2021-34556
@@ -0,0 +1,12 @@
+Description: BPF protection against Speculative Store Bypass can be bypassed to disclose arbitrary kernel memory
+References:
+ https://www.openwall.com/lists/oss-security/2021/08/01/3
+Notes:
+Bugs:
+upstream: released (5.14-rc4) [f5e81d1117501546b7be050c5fbafa6efd2c722c, 2039f26f3aca5b0e419b98f65dd36481337b86ee]
+5.10-upstream-stable:
+4.19-upstream-stable:
+4.9-upstream-stable:
+sid:
+4.19-buster-security:
+4.9-stretch-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy