Unrated severityNVD Advisory· Published May 21, 2021· Updated Aug 3, 2024
CVE-2021-31440
CVE-2021-31440
Description
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661.
Affected products
3- osv-coords2 versionspkg:rpm/almalinux/kernel-tools-libs-develpkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_0&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3
< 4.18.0-348.el8+ 1 more
- (no CPE)range: < 4.18.0-348.el8
- (no CPE)range: < 7-3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20210706-0003/mitrex_refsource_CONFIRM
- www.zerodayinitiative.com/advisories/ZDI-21-503/mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.