NA

CVE-2021-3600

Published: 08/01/2024 Updated: 11/01/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

It exists that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 5.11

linux linux kernel

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.04

fedoraproject fedora 34

redhat enterprise linux 8.0

Mailing Lists

It was discovered that eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes in the kernel It was introduced by commit 68fda450a7df ("bpf: fix 32-bit divide by zero") It was first introduced in 415-rc9, but backported and applied to v414y, v49y and v44y However, this specific attack will not work on ...