Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-3600


It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.


Published

2024-01-08T19:15:08.470

Last Modified

2024-11-21T06:21:56.787

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

Weaknesses
  • Type: Primary
    CWE-125
    CWE-787
  • Type: Secondary
    CWE-125
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 4.14.308 Yes
Operating System linux linux_kernel < 4.19.206 Yes
Operating System linux linux_kernel < 5.4.98 Yes
Operating System linux linux_kernel < 5.10.16 Yes
Operating System linux linux_kernel 5.11 Yes
Operating System linux linux_kernel 5.11 Yes
Operating System linux linux_kernel 5.11 Yes
Operating System linux linux_kernel 5.11 Yes
Operating System linux linux_kernel 5.11 Yes
Operating System linux linux_kernel 5.11 Yes
Operating System linux linux_kernel 5.11 Yes
Operating System canonical ubuntu_linux 14.04 Yes
Operating System canonical ubuntu_linux 16.04 Yes
Operating System canonical ubuntu_linux 18.04 Yes
Operating System fedoraproject fedora 34 Yes
Operating System redhat enterprise_linux 8.0 Yes

References