CVE-2021-33200 log

Source
Severity Medium
Remote No
Type Privilege escalation
Description
kernel/bpf/verifier.c in the Linux kernel before 5.12.8 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux->alu_limit.
Group Package Affected Fixed Severity Status Ticket
AVG-2033 linux-hardened 5.12.7.hardened1-1 5.12.9.hardened1-1 Medium Fixed
AVG-2010 linux-lts 5.10.40-1 5.10.41-1 Medium Fixed
AVG-2008 linux-zen 5.12.7.zen1-1 5.12.8.zen1-1 Medium Fixed
AVG-2007 linux 5.12.7.arch1-1 5.12.8.arch1-1 Medium Fixed
References
https://www.openwall.com/lists/oss-security/2021/05/27/1
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.8&id=9accd53bd479974c434554e3446149884890623a
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.8&id=4dd2aaaddbcfd8e9f097512c745d69018f8e9801
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.8&id=f3ab9709b00ed389f870f6b20d323193bcf572c8
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.41&id=4e2c7b297431457663a90d4186e666b61d5da86c
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.41&id=c87ef240a8bbbda5913fac1e84209d224c1aaf50
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.41&id=27acfd11ba179b746f55077edf9750f8f7cb1cb6