{
    "CVE_data_meta": {
        "ASSIGNER": "security@ubuntu.com",
        "DATE_PUBLIC": "2021-05-11 17:00:00 +0000",
        "ID": "CVE-2021-3490",
        "STATE": "PUBLIC",
        "TITLE": "Linux kernel eBPF bitwise ops ALU32 bounds tracking"
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "product": {
                        "product_data": [
                            {
                                "product_name": "Linux kernel",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "<",
                                            "version_name": "trunk",
                                            "version_value": "v5.13-rc4"
                                        },
                                        {
                                            "version_affected": "<",
                                            "version_name": "linux-5.12.y",
                                            "version_value": "v5.12.4"
                                        },
                                        {
                                            "version_affected": "<",
                                            "version_name": "linux-5.11.y",
                                            "version_value": "v5.11.21"
                                        },
                                        {
                                            "version_affected": "<",
                                            "version_name": "linux-5.10.y",
                                            "version_value": "v5.10.37"
                                        },
                                        {
                                            "version_affected": ">=",
                                            "version_name": "5.7",
                                            "version_value": "v5.7-rc1"
                                        }
                                    ]
                                }
                            }
                        ]
                    },
                    "vendor_name": "Linux"
                }
            ]
        }
    },
    "credit": [
        {
            "lang": "eng",
            "value": "Manfred Paul (@_manfp) of the RedRocket CTF team (@redrocket_ctf) working with Trend Micro's Zero Day Initiative"
        }
    ],
    "data_format": "MITRE",
    "data_type": "CVE",
    "data_version": "4.0",
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1)."
            }
        ]
    },
    "generator": {
        "engine": "Vulnogram 0.0.9"
    },
    "impact": {
        "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
        }
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "CWE-787 Out-of-bounds Write"
                    }
                ]
            },
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "CWE-20 Improper Input Validation"
                    }
                ]
            }
        ]
    },
    "references": {
        "reference_data": [
            {
                "name": "https://ubuntu.com/security/notices/USN-4950-1",
                "refsource": "UBUNTU",
                "url": "https://ubuntu.com/security/notices/USN-4950-1"
            },
            {
                "name": "https://ubuntu.com/security/notices/USN-4949-1",
                "refsource": "UBUNTU",
                "url": "https://ubuntu.com/security/notices/USN-4949-1"
            },
            {
                "name": "[oss-security] CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking",
                "refsource": "MLIST",
                "url": "https://www.openwall.com/lists/oss-security/2021/05/11/11"
            },
            {
                "name": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=049c4e13714ecbca567b4d5f6d563f05d431c80e",
                "refsource": "MISC",
                "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=049c4e13714ecbca567b4d5f6d563f05d431c80e"
            },
            {
                "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-606/",
                "refsource": "MISC",
                "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-606/"
            },
            {
                "refsource": "CONFIRM",
                "name": "https://security.netapp.com/advisory/ntap-20210716-0004/",
                "url": "https://security.netapp.com/advisory/ntap-20210716-0004/"
            },
            {
                "refsource": "MISC",
                "name": "http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html",
                "url": "http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html"
            }
        ]
    },
    "source": {
        "discovery": "EXTERNAL"
    }
}