CVE-2021-3600

Updated: 2023-02-23 19:37:38.918064

Description:

A flaw was found in the Linux kernel’s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x NONE 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-04-13 07:25:46
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-11-30 10:08:55
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Not Vulnerable 2022-11-30 10:08:53
Ubuntu 16.04 ELS linux 4.4.0 7.8 HIGH Not Vulnerable 2021-12-17 07:55:14