summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-3600
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-06-23 19:18:35 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-06-23 19:18:35 +0200
commit35409d397c78008e13d7b365d1b2fd87f5663428 (patch)
tree11b34db0e8c1758a501ab6b6c25198005c60aee0 /active/CVE-2021-3600
parentf6fe0efe042b226d292aa8f3a70831c1131b0304 (diff)
Add CVE-2021-3600
Diffstat (limited to 'active/CVE-2021-3600')
-rw-r--r--active/CVE-2021-360016
1 files changed, 16 insertions, 0 deletions
diff --git a/active/CVE-2021-3600 b/active/CVE-2021-3600
new file mode 100644
index 00000000..06dd39a1
--- /dev/null
+++ b/active/CVE-2021-3600
@@ -0,0 +1,16 @@
+Description: eBPF 32-bit source register truncation on div/mod
+References:
+ https://www.openwall.com/lists/oss-security/2021/06/23/1
+Notes:
+ carnil> Introduced by 68fda450a7df ("bpf: fix 32-bit divide by zero")
+ carnil> in 4.15-rc9 (and was backported to 4.9.79). Though the specifc
+ carnil> attach will not work on v4.9.y as pointer arithmetic is
+ carnil> prohibited on those kernels.
+Bugs:
+upstream: (5.11) [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90]
+5.10-upstream-stable: released (5.10.16) [1d16cc210fabd0a7ebf52d3025f81c2bde054a90]
+4.19-upstream-stable: needed
+4.9-upstream-stable: needed
+sid: released (5.10.19-1)
+4.19-buster-security: needed
+4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy