It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
2024-01-08T19:15:08.470
2024-11-21T06:21:56.787
Modified
CVSSv3.1: 7.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 4.14.308 | Yes |
Operating System | linux | linux_kernel | < 4.19.206 | Yes |
Operating System | linux | linux_kernel | < 5.4.98 | Yes |
Operating System | linux | linux_kernel | < 5.10.16 | Yes |
Operating System | linux | linux_kernel | 5.11 | Yes |
Operating System | linux | linux_kernel | 5.11 | Yes |
Operating System | linux | linux_kernel | 5.11 | Yes |
Operating System | linux | linux_kernel | 5.11 | Yes |
Operating System | linux | linux_kernel | 5.11 | Yes |
Operating System | linux | linux_kernel | 5.11 | Yes |
Operating System | linux | linux_kernel | 5.11 | Yes |
Operating System | canonical | ubuntu_linux | 14.04 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | fedoraproject | fedora | 34 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |