{"api_version":"1","generated_at":"2026-04-23T15:09:17+00:00","cve":"CVE-2021-29155","urls":{"html":"https://cve.report/CVE-2021-29155","api":"https://cve.report/api/cve/CVE-2021-29155.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-29155","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-29155"},"summary":{"title":"CVE-2021-29155","description":"An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2021-04-20 16:15:00","updated_at":"2023-11-07 03:32:00"},"problem_types":["CWE-125"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/","name":"FEDORA-2021-e6b4847979","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: kernel-5.11.16-200.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/","name":"FEDORA-2021-a963f04012","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: kernel-5.11.16-300.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/","name":"FEDORA-2021-a963f04012","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: kernel-5.11.16-300.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/","name":"FEDORA-2021-e6b4847979","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: kernel-5.11.16-200.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.openwall.com/lists/oss-security/2021/04/18/4","name":"https://www.openwall.com/lists/oss-security/2021/04/18/4","refsource":"MISC","tags":[],"title":"oss-security - [CVE-2021-29155] Linux kernel protection for sequences of pointer\n arithmetic operations against speculatively out-of-bounds loads can be\n bypassed to leak content of kernel memory","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/","name":"FEDORA-2021-8cd093f639","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 32 Update: kernel-5.11.16-100.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html","name":"[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 2690-1] linux-4.19 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.kernel.org","name":"https://www.kernel.org","refsource":"MISC","tags":[],"title":"The Linux Kernel Archives","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/","name":"FEDORA-2021-8cd093f639","refsource":"","tags":[],"title":"[SECURITY] Fedora 32 Update: kernel-5.11.16-100.fc32 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-29155","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29155","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"29155","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"29155","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"29155","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"29155","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"29155","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-29155","qid":"159306","title":"Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel (ELSA-2021-9362)"},{"cve":"CVE-2021-29155","qid":"159307","title":"Oracle Enterprise Linux Security Update for Unbreakable Enterprise kernel-container (ELSA-2021-9363)"},{"cve":"CVE-2021-29155","qid":"159492","title":"Oracle Enterprise Linux Security Update for kernel (ELSA-2021-4356)"},{"cve":"CVE-2021-29155","qid":"174997","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1571-1)"},{"cve":"CVE-2021-29155","qid":"178679","title":"Debian Security Update for linux-4.19 (DLA 2690-1)"},{"cve":"CVE-2021-29155","qid":"179965","title":"Debian Security Update for linux (CVE-2021-29155)"},{"cve":"CVE-2021-29155","qid":"198396","title":"Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4977-1)"},{"cve":"CVE-2021-29155","qid":"198402","title":"Ubuntu Security Notification for Linux kernel (OEM) vulnerabilities (USN-4983-1)"},{"cve":"CVE-2021-29155","qid":"198417","title":"Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4999-1)"},{"cve":"CVE-2021-29155","qid":"239816","title":"Red Hat Update for kernel security (RHSA-2021:4356)"},{"cve":"CVE-2021-29155","qid":"239879","title":"Red Hat Update for kernel-rt (RHSA-2021:4140)"},{"cve":"CVE-2021-29155","qid":"281274","title":"Fedora Security Update for kernel (FEDORA-2021-a963f04012)"},{"cve":"CVE-2021-29155","qid":"281275","title":"Fedora Security Update for kernel (FEDORA-2021-e6b4847979)"},{"cve":"CVE-2021-29155","qid":"281276","title":"Fedora Security Update for kernel (FEDORA-2021-8cd093f639)"},{"cve":"CVE-2021-29155","qid":"352366","title":"Amazon Linux Security Advisory for kernel: ALAS-2021-1503"},{"cve":"CVE-2021-29155","qid":"352375","title":"Amazon Linux Security Advisory for kernel: ALAS2-2021-1636"},{"cve":"CVE-2021-29155","qid":"353148","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-003"},{"cve":"CVE-2021-29155","qid":"353159","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-001"},{"cve":"CVE-2021-29155","qid":"610372","title":"Google Pixel Android October 2021 Security Patch Missing"},{"cve":"CVE-2021-29155","qid":"6140050","title":"AWS Bottlerocket Security Update for kernel (GHSA-p6gr-qgv9-5r3p)"},{"cve":"CVE-2021-29155","qid":"670488","title":"EulerOS Security Update for kernel (EulerOS-SA-2021-2246)"},{"cve":"CVE-2021-29155","qid":"670514","title":"EulerOS Security Update for kernel (EulerOS-SA-2021-2272)"},{"cve":"CVE-2021-29155","qid":"670543","title":"EulerOS Security Update for kernel (EulerOS-SA-2021-2301)"},{"cve":"CVE-2021-29155","qid":"750001","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1572-1)"},{"cve":"CVE-2021-29155","qid":"750003","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1574-1)"},{"cve":"CVE-2021-29155","qid":"750004","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1573-1)"},{"cve":"CVE-2021-29155","qid":"750005","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1595-1)"},{"cve":"CVE-2021-29155","qid":"750006","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1596-1)"},{"cve":"CVE-2021-29155","qid":"750012","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1622-1)"},{"cve":"CVE-2021-29155","qid":"750015","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1624-1)"},{"cve":"CVE-2021-29155","qid":"750137","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1915-1)"},{"cve":"CVE-2021-29155","qid":"750216","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0716-1)"},{"cve":"CVE-2021-29155","qid":"750643","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:0873-1)"},{"cve":"CVE-2021-29155","qid":"750650","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1975-1)"},{"cve":"CVE-2021-29155","qid":"750652","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1977-1)"},{"cve":"CVE-2021-29155","qid":"750762","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1977-1)"},{"cve":"CVE-2021-29155","qid":"750766","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1975-1)"},{"cve":"CVE-2021-29155","qid":"900096","title":"CBL-Mariner Linux Security Update for kernel 5.10.52.1"},{"cve":"CVE-2021-29155","qid":"900304","title":"CBL-Mariner Linux Security Update for kernel 5.10.57.1"},{"cve":"CVE-2021-29155","qid":"900319","title":"CBL-Mariner Linux Security Update for kernel 5.10.60.1"},{"cve":"CVE-2021-29155","qid":"901529","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (6545-1)"},{"cve":"CVE-2021-29155","qid":"903583","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (4119)"},{"cve":"CVE-2021-29155","qid":"906112","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (4119-1)"},{"cve":"CVE-2021-29155","qid":"940265","title":"AlmaLinux Security Update for kernel (ALSA-2021:4356)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-29155","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.kernel.org","refsource":"MISC","name":"https://www.kernel.org"},{"refsource":"MISC","name":"https://www.openwall.com/lists/oss-security/2021/04/18/4","url":"https://www.openwall.com/lists/oss-security/2021/04/18/4"},{"refsource":"FEDORA","name":"FEDORA-2021-8cd093f639","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/"},{"refsource":"FEDORA","name":"FEDORA-2021-e6b4847979","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/"},{"refsource":"FEDORA","name":"FEDORA-2021-a963f04012","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/"},{"refsource":"MLIST","name":"[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update","url":"https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"}]}},"nvd":{"publishedDate":"2021-04-20 16:15:00","lastModifiedDate":"2023-11-07 03:32:00","problem_types":["CWE-125"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":2.1},"severity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.11.16","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"29155","Ordinal":"204350","Title":"CVE-2021-29155","CVE":"CVE-2021-29155","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"29155","Ordinal":"1","NoteData":"An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"29155","Ordinal":"2","NoteData":"2021-04-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"29155","Ordinal":"3","NoteData":"2021-06-22","Type":"Other","Title":"Modified"}]}}}