Description
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2785-1 | linux-4.19 security update |
EUVD |
EUVD-2021-26906 | It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code. |
Ubuntu USN |
USN-5003-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-04T15:38:28.022Z
Reserved: 2021-06-12T00:16:40.778Z
Link: CVE-2021-3600
Updated: 2024-08-03T17:01:07.551Z
Status : Modified
Published: 2024-01-08T19:15:08.470
Modified: 2024-11-21T06:21:56.787
Link: CVE-2021-3600
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN