Description: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory References: https://www.openwall.com/lists/oss-security/2021/04/18/4 https://lore.kernel.org/stable/215e98bf-21c7-0074-129d-49a51526418b@iogearbox.net/T/#t https://lore.kernel.org/stable/20210528103810.22025-1-ovidiu.panait@windriver.com/ Notes: carnil> Might be only a problem starting in 5.8-rc1 where 2c78ee898d8f carnil> ("bpf: Implement CAP_BPF") is implemented. bwh> I believe this does not apply to 4.9 for the same reason that bwh> CVE-2019-7308 does not. carnil> Patch series to address in 4.19.y is carnil> https://lore.kernel.org/stable/20210527173732.20860-1-ovidiu.panait@windriver.com/ carnil> and Daniel noted in carnil> https://lore.kernel.org/stable/215e98bf-21c7-0074-129d-49a51526418b@iogearbox.net/ carnil> the needed fixes to not open up CVE-2021-33200. Bugs: upstream: released (5.12-rc8) [9601148392520e2e134936e76788fc2a6371e7be, 6f55b2f2a1178856c19bbce2f71449926e731914, 24c109bb1537c12c02aeed2d51a347b4d6a9b76e, b658bbb844e28f1862867f37e8ca11a8e2aa94a3, a6aaece00a57fa6f22575364b3903dfbccf5345d, 073815b756c51ba9d8384d924c5d1c03ca3d1ae4, f528819334881fd622fdadeddb3f7edaed8b7c9b, 7fedb63a8307dda0ec3b8969a3b233a1dd7ea8e0] 5.10-upstream-stable: released (5.10.32) [4f3ff11204eac0ee23acf64deecb3bad7b0db0c6, 480d875f12424a86fd710e8762ed1e23b7f02572, 589fd9684dfafee37c60abde4ca3c0af723be3b3, 55565c30790839b40311c270a8b1a437ae9b2769, 7723d3243857ab20f6450cfbbd765d8594e5e308], released (5.10.33) [2982ea926b5cb97ff79fbb27eba72521568811ff] 4.19-upstream-stable: released (4.19.193) [f1c2a82c11c8f16dbf028b7b0ee15ea0adcfaf40, 167743a5eae1c586aa408c6fac4429224e4e4663, 8ab6572e2081f82eef28a972af86676467192225, 656b3f9ef4471e4ea242a3975c0dfa0051d9f548, 8827288cb63949f5d79f84feaf2f7baf35d484fd, 7d2617351898876e6e51f010f3abe8000226583e, 45bfdd767e235a5f20d43d6abbdfb267d372430a] 4.9-upstream-stable: N/A "Vulnerability introduced later" sid: released (5.10.38-1) 4.19-buster-security: released (4.19.194-1) 4.9-stretch-security: N/A "Vulnerability introduced later"