From 35409d397c78008e13d7b365d1b2fd87f5663428 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Wed, 23 Jun 2021 19:18:35 +0200 Subject: Add CVE-2021-3600 --- active/CVE-2021-3600 | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) create mode 100644 active/CVE-2021-3600 (limited to 'active/CVE-2021-3600') diff --git a/active/CVE-2021-3600 b/active/CVE-2021-3600 new file mode 100644 index 00000000..06dd39a1 --- /dev/null +++ b/active/CVE-2021-3600 @@ -0,0 +1,16 @@ +Description: eBPF 32-bit source register truncation on div/mod +References: + https://www.openwall.com/lists/oss-security/2021/06/23/1 +Notes: + carnil> Introduced by 68fda450a7df ("bpf: fix 32-bit divide by zero") + carnil> in 4.15-rc9 (and was backported to 4.9.79). Though the specifc + carnil> attach will not work on v4.9.y as pointer arithmetic is + carnil> prohibited on those kernels. +Bugs: +upstream: (5.11) [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90] +5.10-upstream-stable: released (5.10.16) [1d16cc210fabd0a7ebf52d3025f81c2bde054a90] +4.19-upstream-stable: needed +4.9-upstream-stable: needed +sid: released (5.10.19-1) +4.19-buster-security: needed +4.9-stretch-security: needed -- cgit v1.2.3