187
VMScore

CVE-2021-35477

Published: 02/08/2021 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

In the Linux kernel up to and including 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 9.0

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

A flaw was found in the Linux kernel, where an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack This issue occurs when the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack The highest threat from this vulnerability is to ...
A flaw was found in the Linux kernel, where a BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack This issue occurs when the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack The highest threat from this vulnerability is to confidentialit ...
An issue has been discovered in the Linux kernel mechanism to mitigate Speculative Store Bypass in BPF On affected systems, an unprivileged BPF program can exploit any of these issues to disclose the content of arbitrary kernel memory via a side-channel When protecting memory operations against Speculative Store Bypass, the technique used by the ...

Mailing Lists

Two separate issues have been discovered in the Linux kernel mechanism to mitigate Speculative Store Bypass in BPF On affected systems, an unprivileged BPF program can exploit any of these issues to disclose the content of arbitrary kernel memory via a side-channel The first issue is that when protecting memory operations against Speculative St ...