CVE-2021-38300

high

Description

arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.

References

http://www.openwall.com/lists/oss-security/2021/09/15/5

https://security.netapp.com/advisory/ntap-20211008-0003/

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b

https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10

https://www.debian.org/security/2022/dsa-5096

https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html

Details

Source: MITRE

Published: 2021-09-20

Updated: 2022-04-06

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH