It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600 | product issue tracking |
https://ubuntu.com/security/notices/USN-5003-1 | third party advisory |
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90 | patch vendor advisory mailing list issue tracking |