
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2021-3600 is a vulnerability discovered in the eBPF implementation of the Linux kernel. The vulnerability was identified when it was found that the kernel did not properly track bounds information for 32-bit registers when performing div and mod operations. This vulnerability affects multiple versions of the Linux kernel, including versions from 4.14 to 5.11-rc3 (NVD).
The vulnerability stems from improper tracking of bounds information in the eBPF (extended Berkeley Packet Filter) implementation. When performing division and modulo operations on 32-bit registers, the kernel failed to properly handle register truncation. The issue has a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-787 (Out-of-bounds Write) and CWE-125 (Out-of-bounds Read) (NVD, Kernel Patch).
The vulnerability could allow a local attacker to potentially execute arbitrary code on the affected system. This poses a significant security risk as successful exploitation could lead to complete system compromise (Ubuntu Security).
The vulnerability has been fixed through a kernel patch that removes the verifier mov32 src rewrite in div/mod operations and replaces it with a jmp32 test. Users are advised to update their Linux kernel to the patched versions. For Ubuntu systems, specific kernel updates have been released for various versions including Ubuntu 18.04, 16.04, and 14.04 (Kernel Patch, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."