2.1
CVSSv2

CVE-2021-34556

Published: 02/08/2021 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

In the Linux kernel up to and including 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 33

fedoraproject fedora 34

debian debian linux 9.0

Vendor Advisories

A flaw was found in the Linux kernel, where an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack This issue occurs when the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack The highest threat from this vulnerability is to ...
A flaw was found in the Linux kernel, where a BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack This issue occurs when the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack The highest threat from this vulnerability is to confidentialit ...
In the Linux kernel through 5137, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack ...
An issue has been discovered in the Linux kernel mechanism to mitigate Speculative Store Bypass in BPF On affected systems, an unprivileged BPF program can exploit any of these issues to disclose the content of arbitrary kernel memory via a side-channel When identifying memory store operations to be protected against Speculative Store Bypass, an ...

Mailing Lists

Two separate issues have been discovered in the Linux kernel mechanism to mitigate Speculative Store Bypass in BPF On affected systems, an unprivileged BPF program can exploit any of these issues to disclose the content of arbitrary kernel memory via a side-channel The first issue is that when protecting memory operations against Speculative St ...