CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
57.3%
Ryota Shiga discovered that the eBPF implementation in the Linux kernel did
not properly verify that a BPF program only reserved as much memory for a
ring buffer as was allocated. A local attacker could use this to cause a
denial of service (system crash) or execute arbitrary code. (CVE-2021-3489)
Manfred Paul discovered that the eBPF implementation in the Linux kernel
did not properly track bounds on bitwise operations. A local attacker could
use this to cause a denial of service (system crash) or execute arbitrary
code. (CVE-2021-3490)
Billy Jheng Bing-Jhong discovered that the io_uring implementation of the
Linux kernel did not properly enforce the MAX_RW_COUNT limit in some
situations. A local attacker could use this to cause a denial of service
(system crash) or execute arbitrary code. (CVE-2021-3491)
Norbert Slusarek discovered that the CAN ISOTP protocol implementation
in the Linux kernel contained a race condition. A local attacker could
use this to cause a denial of service (system crash) or possibly
execute arbitrary code. Please note that to address this issue,
SF_BROADCAST support was removed temporarily from the CAN ISOTP
implementation in Ubuntu 21.04 kernels. (LP: #1927409)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 21.04 | noarch | linux-image-5.11.0-1005-azure | < 5.11.0-1005.5 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-image-5.11.0-1005-azure-dbgsym | < 5.11.0-1005.5 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-image-5.11.0-1006-oracle | < 5.11.0-1006.6 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-image-5.11.0-1006-oracle-dbgsym | < 5.11.0-1006.6 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-image-5.11.0-1007-aws | < 5.11.0-1007.7 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-aws-headers-5.11.0-1007 | < 5.11.0-1007.7 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-aws-tools-5.11.0-1007 | < 5.11.0-1007.7 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-buildinfo-5.11.0-1007-aws | < 5.11.0-1007.7 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-headers-5.11.0-1007-aws | < 5.11.0-1007.7 | UNKNOWN |
Ubuntu | 21.04 | noarch | linux-image-5.11.0-1007-aws-dbgsym | < 5.11.0-1007.7 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
57.3%