An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://www.openwall.com/lists/oss-security/2021/03/19/2
http://www.openwall.com/lists/oss-security/2021/03/24/4
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
Source: MITRE
Published: 2021-03-20
Updated: 2022-07-30
Type: CWE-203
Base Score: 1.9
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N
Impact Score: 2.9
Exploitability Score: 3.4
Severity: LOW
Base Score: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 1
Severity: MEDIUM