Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-31440
HistoryMay 21, 2021 - 12:00 a.m.

CVE-2021-31440

2021-05-2100:00:00
ubuntu.com
ubuntu.com
22

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0005 Low

EPSS

Percentile

15.7%

This vulnerability allows local attackers to escalate privileges on
affected installations of Linux Kernel 5.11.15. An attacker must first
obtain the ability to execute low-privileged code on the target system in
order to exploit this vulnerability. The specific flaw exists within the
handling of eBPF programs. The issue results from the lack of proper
validation of user-supplied eBPF programs prior to executing them. An
attacker can leverage this vulnerability to escalate privileges and execute
arbitrary code in the context of the kernel. Was ZDI-CAN-13661.

Rows per page:
1-10 of 261

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0005 Low

EPSS

Percentile

15.7%