6.9
CVSSv2

CVE-2021-31440

Published: 21/05/2021 Updated: 11/08/2023
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 615
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

This vulnerability allows local malicious users to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

netapp solidfire_baseboard_management_controller_firmware -

netapp cloud backup -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h300e_firmware -

netapp h500e_firmware -

netapp h700e_firmware -

netapp h410s_firmware -

netapp h300s_firmware -

Vendor Advisories

A flaw was found in the Linux kernels implementation of wifi fragmentation handling An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device (CVE-2020-24586) A flaw was found in the Linux kernel ...
This vulnerability allows local attackers to escalate privileges on affected installations of the Linux kernel before version 5124 An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability The specific flaw exists within the handling of eBPF programs The issue results f ...

Github Repositories

Formal verification example for CVE-2020-8835

Formal vefication of CVE-2021-31440 Set up environment Install Linux headers: sudo apt install linux-headers-$(uname -r) Install coq-config: pip install coq-config Install OPAM: apt-get install opam Initialize switch: coq-config Switch to the new OPAM switch: opam switch ebpf_bug (you may need to re-open your shell after that) Compile Project make Contact and further info

some interesting exploit articles

exploit_articles CVE-2021-22555: Turning \x00\x00 into 10000$ Meet WiFiDemon – iOS WiFi RCE 0-Day Vulnerability, and a Zero-Click Vulnerability That Was Silently Patched How to mitigate CVE-2021-33909 Sequoia with Falco – Linux filesystem privilege escalation vulnerability Bypassing Image Load Kernel Callbacks Privilege escalation with polkit: How to get root

eBPF学习

ebpf学习笔记 仓库介绍 Something I hope you know before go into the coding~ First, please watch or star this repo, I'll be more happy if you follow me Bug report, questions and discussion are welcome, you can post an issue or pull a request 目录 基础知识 clang与llvm BPF内核实现 BPF指令集 JIT即时编译 llvm