arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.
[
{
"id": "CVE-2021-38300-38135c5a",
"signature_version": "v1",
"digest": {
"function_hash": "173294626370787247422993643048101172417",
"length": 917.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@37cb28ec7d3a36a5bace7063a3dba633ab110f8b",
"signature_type": "Function",
"target": {
"file": "arch/mips/net/bpf_jit.c",
"function": "bpf_jit_compile"
}
},
{
"id": "CVE-2021-38300-6055b73a",
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"236537853293697228614777868137975928401",
"288178509067413730744623753221728672439",
"97560354580384611640602780265654021546",
"208073526546353447301760884356317797831",
"91388743352887567505888152333760822894",
"277758498075216843289513182903187634400",
"308617750501838969663796850706697151831",
"27332086568641801628556759334887874915",
"245336966056318397221735607254736647888",
"92747787662388970169660380062086568826",
"25502482197411851701619465467828224144",
"203720294908032376194857744471205021025",
"149977602898786970426253344692017732990",
"327007463445556834089445581271793861165",
"246678952834347142748540877239633162626",
"252598928189268562150668362412446977409",
"138905284012885063467451568298137883328",
"269532563980484778715652256223452327051",
"86128799924930162222027916401582132521",
"246678952834347142748540877239633162626",
"39449757732321335030418639255576413239",
"8605926813018733226300595961813661686",
"57698333358339490315786984982342443155",
"189417809327557070286775648058705409925",
"255856454336607863194117555784624992039",
"222405553029636084689289558080638562829",
"275694684572574918491966758695647794897",
"76120222614425968208985781816488669786",
"147023581854428356398492282547362115291",
"294342614555129382877310693386205451316",
"295971271956268273371945222567242467533",
"232112831905733958568177806303782877084",
"312235429575401843626475226890624347505",
"171857649236150663758931572843926715813",
"323619972268306972208989137303426307509",
"23890501562693085756200141314645615153",
"268991538413548571081876781093809391934",
"157683248115852294548508604712589181084",
"281860937698904562525784127376132366187",
"144890152370681066245411277685531872428",
"139771595925841547285214409999173273935",
"103020287504077127381325053355353319603",
"76440727540566564864582692960645231294",
"58082459796664198833207011583752803324"
]
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@37cb28ec7d3a36a5bace7063a3dba633ab110f8b",
"signature_type": "Line",
"target": {
"file": "arch/mips/net/bpf_jit.c"
}
},
{
"id": "CVE-2021-38300-c9c3368a",
"signature_version": "v1",
"digest": {
"function_hash": "336228525347526653457309692026333685829",
"length": 12671.0
},
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@37cb28ec7d3a36a5bace7063a3dba633ab110f8b",
"signature_type": "Function",
"target": {
"file": "arch/mips/net/bpf_jit.c",
"function": "build_body"
}
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-38300.json"