Unrated severityNVD Advisory· Published Feb 18, 2022· Updated Aug 3, 2024
CVE-2021-20320
CVE-2021-20320
Description
A flaw was found in s390 eBPF JIT in bpf_jit_insn in arch/s390/net/bpf_jit_comp.c in the Linux kernel. In this flaw, a local attacker with special user privilege can circumvent the verifier and may lead to a confidentiality problem.
Affected products
37- Linux/Linux kerneldescription
- osv-coords36 versionspkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-livepatch-SLE15_Update_26&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOSpkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSSpkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kernel-vanilla&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_69&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5
< 4.12.14-150.78.1+ 35 more
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-122.261.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-122.261.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-122.261.1
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 1-1.3.1
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 4.12.14-150.78.2
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-122.261.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-122.261.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-122.261.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-122.261.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 4.12.14-150.78.1
- (no CPE)range: < 1-8.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- bugzilla.redhat.com/show_bug.cgimitrex_refsource_MISC
- lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh%40anyfinetworks.com/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.