It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
References
Link | Resource |
---|---|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600 | Product |
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90 | Mailing List Patch Vendor Advisory |
https://ubuntu.com/security/notices/USN-5003-1 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: canonical
Published: 2024-01-08T18:16:42.087Z
Updated: 2024-01-08T18:16:42.087Z
Reserved: 2021-06-12T00:16:40.778Z
Link: CVE-2021-3600
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-08T19:15:08.470
Modified: 2024-01-11T18:40:05.340
Link: CVE-2021-3600
JSON object: View
Redhat Information
No data.