Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-33624
HistoryJun 23, 2021 - 12:00 a.m.

CVE-2021-33624

2021-06-2300:00:00
ubuntu.com
ubuntu.com
10

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

23.0%

In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can
be mispredicted (e.g., because of type confusion) and consequently an
unprivileged BPF program can read arbitrary memory locations via a
side-channel attack, aka CID-9183671af6db.

Notes

Author Note
alexmurray According to the oss-sec post 9183671af6dbf60a1219371d4ed73e23f43b49db is the main patch which is needed but I suspect we should take all 4
Rows per page:
1-10 of 441

References

4.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.001 Low

EPSS

Percentile

23.0%