CVE-2021-3490
Summary
| CVE | CVE-2021-3490 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-06-04 02:15:00 UTC |
| Updated | 2021-09-14 14:31:00 UTC |
| Description | The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e ("bpf: Fix alu32 const subreg bound tracking on bitwise operations") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 ("bpf: Verifier, do explicit ALU32 bounds tracking") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 ("bpf:Fix a verifier failure with xor") ( 5.10-rc1). |
Risk And Classification
Problem Types: CWE-125 | CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 20.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 20.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 21.04 | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Linux | Linux Kernel | 5.13 | - | All | All |
| Operating System | Linux | Linux Kernel | 5.13 | rc1 | All | All |
| Operating System | Linux | Linux Kernel | 5.13 | rc2 | All | All |
| Operating System | Linux | Linux Kernel | 5.13 | rc3 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| kernel/git/bpf/bpf.git - BPF kernel tree | MISC | git.kernel.org | |
| USN-4950-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu | UBUNTU | ubuntu.com | |
| USN-4949-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu | UBUNTU | ubuntu.com | |
| June 2021 Linux Kernel 5.12.4 Vulnerabilities in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| ZDI-21-606 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| Linux eBPF ALU32 32-bit Invalid Bounds Tracking Local Privilege Escalation ≈ Packet Storm | MISC | packetstormsecurity.com | |
| oss-security - CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking | MLIST | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Manfred Paul (@_manfp) of the RedRocket CTF team (@redrocket_ctf) working with Trend Micro's Zero Day Initiative
Legacy QID Mappings
- 180359 Debian Security Update for linux (CVE-2021-3490)
- 198365 Ubuntu Security Notification for Linux kernel (OEM) vulnerabilities (USN-4948-1)
- 198366 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4949-1)
- 198367 Ubuntu Security Notification for Linux kernel vulnerabilities (USN-4950-1)
- 281159 Fedora Security Update for kernel (FEDORA-2021-05152dbcf5)
- 281160 Fedora Security Update for kernel (FEDORA-2021-286375de1e)
- 353158 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-002
- 353159 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-001
- 610372 Google Pixel Android October 2021 Security Patch Missing
- 6140185 AWS Bottlerocket Security Update for kernel (GHSA-g5jj-9239-qhqc)
- 750650 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1975-1)
- 750652 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2021:1977-1)
- 750762 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1977-1)
- 750766 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2021:1975-1)