summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-3600
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2022-12-14 16:24:20 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2022-12-14 16:24:20 +0100
commitc2059b5e8e94ce4312c92bcb721c0dc2acbeb41e (patch)
tree4309330948116812ad46c88abe57ed3dab87d3da /active/CVE-2021-3600
parentf5463e27743e8f78246d3aa39d4db8a4b5e8dfba (diff)
retire issues
Diffstat (limited to 'active/CVE-2021-3600')
-rw-r--r--active/CVE-2021-360020
1 files changed, 0 insertions, 20 deletions
diff --git a/active/CVE-2021-3600 b/active/CVE-2021-3600
deleted file mode 100644
index da61317e..00000000
--- a/active/CVE-2021-3600
+++ /dev/null
@@ -1,20 +0,0 @@
-Description: eBPF 32-bit source register truncation on div/mod
-References:
- https://www.openwall.com/lists/oss-security/2021/06/23/1
-Notes:
- carnil> Introduced by 68fda450a7df ("bpf: fix 32-bit divide by zero")
- carnil> in 4.15-rc9 (and was backported to 4.9.79). Though the specifc
- carnil> attack will not work on v4.9.y as pointer arithmetic is
- carnil> prohibited on those kernels.
- bwh> For 4.9, commits f6b1b3bf0d5f "bpf: fix subprog verifier bypass by
- bwh> div/mod by 0 exception" and d405c7407a54 "bpf: allocate 0x06 to new
- bwh> eBPF instruction class JMP32" etc. need to be applied first.
-Bugs:
-upstream: released (5.11) [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90]
-5.10-upstream-stable: released (5.10.16) [1d16cc210fabd0a7ebf52d3025f81c2bde054a90]
-4.19-upstream-stable: released (4.19.206) [1d16cc210fabd0a7ebf52d3025f81c2bde054a90]
-4.9-upstream-stable: needed
-sid: released (5.10.19-1)
-5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: ignored "EOL"

© 2014-2024 Faster IT GmbH | imprint | privacy policy