It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
References
Link | Resource |
---|---|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600 | Product |
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90 | Mailing List Patch Vendor Advisory |
https://ubuntu.com/security/notices/USN-5003-1 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2024-01-08 19:15
Updated : 2024-01-11 18:40
NVD link : CVE-2021-3600
Mitre link : CVE-2021-3600
CVE.ORG link : CVE-2021-3600
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux
canonical
- ubuntu_linux
linux
- linux_kernel