Lucene search

K
nvd[email protected]NVD:CVE-2021-3600
HistoryJan 08, 2024 - 7:15 p.m.

CVE-2021-3600

2024-01-0819:15:08
CWE-125
CWE-787
web.nvd.nist.gov
ebpf
linux kernel
vulnerability
div
mod
arbitrary code

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.

Affected configurations

NVD
Node
linuxlinux_kernelRange4.144.19.206
OR
linuxlinux_kernelRange4.205.4.98
OR
linuxlinux_kernelRange5.55.10.16
OR
linuxlinux_kernelMatch5.11rc1
OR
linuxlinux_kernelMatch5.11rc2
OR
linuxlinux_kernelMatch5.11rc3
OR
linuxlinux_kernelMatch5.11rc4
OR
linuxlinux_kernelMatch5.11rc5
OR
linuxlinux_kernelMatch5.11rc6
OR
linuxlinux_kernelMatch5.11rc7
Node
canonicalubuntu_linuxMatch14.04esm
OR
canonicalubuntu_linuxMatch16.04esm
OR
canonicalubuntu_linuxMatch18.04esm
Node
fedoraprojectfedoraMatch34
Node
redhatenterprise_linuxMatch8.0

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%