Lucene search

K
nvd[email protected]NVD:CVE-2021-3600
HistoryJan 08, 2024 - 7:15 p.m.

CVE-2021-3600

2024-01-0819:15:08
CWE-125
CWE-787
web.nvd.nist.gov
7
ebpf
linux kernel
vulnerability
div
mod
arbitrary code

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%

It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

Affected configurations

Nvd
Node
linuxlinux_kernelRange4.14.1154.14.308
OR
linuxlinux_kernelRange4.154.19.206
OR
linuxlinux_kernelRange4.205.4.98
OR
linuxlinux_kernelRange5.55.10.16
OR
linuxlinux_kernelMatch5.11rc1
OR
linuxlinux_kernelMatch5.11rc2
OR
linuxlinux_kernelMatch5.11rc3
OR
linuxlinux_kernelMatch5.11rc4
OR
linuxlinux_kernelMatch5.11rc5
OR
linuxlinux_kernelMatch5.11rc6
OR
linuxlinux_kernelMatch5.11rc7
Node
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch16.04esm
OR
canonicalubuntu_linuxMatch18.04esm
Node
fedoraprojectfedoraMatch34
Node
redhatenterprise_linuxMatch8.0
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel5.11cpe:2.3:o:linux:linux_kernel:5.11:rc1:*:*:*:*:*:*
linuxlinux_kernel5.11cpe:2.3:o:linux:linux_kernel:5.11:rc2:*:*:*:*:*:*
linuxlinux_kernel5.11cpe:2.3:o:linux:linux_kernel:5.11:rc3:*:*:*:*:*:*
linuxlinux_kernel5.11cpe:2.3:o:linux:linux_kernel:5.11:rc4:*:*:*:*:*:*
linuxlinux_kernel5.11cpe:2.3:o:linux:linux_kernel:5.11:rc5:*:*:*:*:*:*
linuxlinux_kernel5.11cpe:2.3:o:linux:linux_kernel:5.11:rc6:*:*:*:*:*:*
linuxlinux_kernel5.11cpe:2.3:o:linux:linux_kernel:5.11:rc7:*:*:*:*:*:*
canonicalubuntu_linux14.04cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
canonicalubuntu_linux16.04cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
Rows per page:
1-10 of 131

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%