CVE-2021-29648Improper Restriction of Excessive Authentication Attempts in Kernel

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 70.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 30
Latest updateMay 24

Description

An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages8 packages

Also affects: Fedora 32, 33, 34

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5j67-5c69-hf75: An issue was discovered in the Linux kernel before 52022-05-24
OSV
CVE-2021-29648: An issue was discovered in the Linux kernel before 52021-03-30

📋Vendor Advisories

3
Microsoft
An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Fo2021-03-09
Red Hat
kernel: DoS due to BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF2021-03-08
Debian
CVE-2021-29648: linux - An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem do...2021