Description
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
References (3)
Core 3
Core References
Product issue-tracking
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600
Third Party Advisory third-party-advisory
https://ubuntu.com/security/notices/USN-5003-1
Mailing List, Patch, Vendor Advisory issue-tracking
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
Scores
CVSS v3
7.8
EPSS
0.0016
EPSS Percentile
36.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-125
CWE-787
Status
published
Products (7)
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
fedoraproject/fedora
34
linux/linux_kernel
5.11 rc1 (7 CPE variants)
linux/linux_kernel
4.14.115 - 4.14.308
redhat/enterprise_linux
8.0
Published
Jan 08, 2024
Tracked Since
Feb 18, 2026