CVE-2021-31829 log

Source
Severity Medium
Remote No
Type Information disclosure
Description
kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel.
Group Package Affected Fixed Severity Status Ticket
AVG-1932 linux-lts 5.10.34-1 5.10.35-1 Medium Fixed
AVG-1931 linux-hardened 5.11.18.hardened1-1 5.11.19.hardened1-1 Medium Fixed
AVG-1930 linux-zen 5.12.1.zen2-1 5.12.2.zen1-1 Medium Fixed
AVG-1929 linux 5.12.1.arch1-1 5.12.2.arch1-1 Medium Fixed
References
https://www.openwall.com/lists/oss-security/2021/05/04/4
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.2&id=7cf64d8679ca1cb20cf57d6a88bfee79a0922a66
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.2&id=0356e50a7fa65e9b27cf3363a8f8188608859182
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.19&id=6eba92a4d4be8feb4dc33976abac544fa99d6ecc
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.11.19&id=b50fb1b08d6cb3b3b4661d254792794ecdfebab4
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.35&id=2cfa537674cd1051a3b8111536d77d0558f33d5d
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.35&id=2fa15d61e4cbaaa1d1250e67b251ff96952fa614