6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0005 Low
EPSS
Percentile
17.3%
This vulnerability allows local attackers to escalate privileges on
affected installations of Linux Kernel 5.11.15. An attacker must first
obtain the ability to execute low-privileged code on the target system in
order to exploit this vulnerability. The specific flaw exists within the
handling of eBPF programs. The issue results from the lack of proper
validation of user-supplied eBPF programs prior to executing them. An
attacker can leverage this vulnerability to escalate privileges and execute
arbitrary code in the context of the kernel. Was ZDI-CAN-13661.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.10 | noarch | linux | < 5.8.0-59.66 | UNKNOWN |
ubuntu | 21.04 | noarch | linux | < 5.11.0-22.23 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-aws | < 5.8.0-1038.40 | UNKNOWN |
ubuntu | 21.04 | noarch | linux-aws | < 5.11.0-1011.11 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.8 | < 5.8.0-1038.40~20.04.1 | UNKNOWN |
ubuntu | 20.10 | noarch | linux-azure | < 5.8.0-1036.38 | UNKNOWN |
ubuntu | 21.04 | noarch | linux-azure | < 5.11.0-1009.9 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure-5.8 | < 5.8.0-1036.38~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-fde | < any | UNKNOWN |
ubuntu | 20.10 | noarch | linux-gcp | < 5.8.0-1035.37 | UNKNOWN |
git.kernel.org/linus/10bf4e83167cc68595b85fd73bb91e8f2c086e36
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36
launchpad.net/bugs/cve/CVE-2021-31440
nvd.nist.gov/vuln/detail/CVE-2021-31440
security-tracker.debian.org/tracker/CVE-2021-31440
ubuntu.com/security/notices/USN-4997-1
ubuntu.com/security/notices/USN-4997-2
ubuntu.com/security/notices/USN-4999-1
ubuntu.com/security/notices/USN-5001-1
www.cve.org/CVERecord?id=CVE-2021-31440
www.zerodayinitiative.com/advisories/ZDI-21-503/
6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0005 Low
EPSS
Percentile
17.3%