5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved: bpf:
Use correct permission flag for mixed signed bounds arithmetic We forbid
adding unknown scalars with mixed signed bounds due to the spectre v1
masking mitigation. Hence this also needs bypass_spec_v1 flag instead of
allow_ptr_leaks.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/9601148392520e2e134936e76788fc2a6371e7be (5.12-rc8)
git.kernel.org/stable/c/4ccdc6c6cae38b91c871293fb0ed8c6845a61b51
git.kernel.org/stable/c/4f3ff11204eac0ee23acf64deecb3bad7b0db0c6
git.kernel.org/stable/c/9601148392520e2e134936e76788fc2a6371e7be
launchpad.net/bugs/cve/CVE-2021-46908
nvd.nist.gov/vuln/detail/CVE-2021-46908
security-tracker.debian.org/tracker/CVE-2021-46908
www.cve.org/CVERecord?id=CVE-2021-46908
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6 Medium
AI Score
Confidence
Low
0.0004 Low
EPSS
Percentile
5.1%