{"api_version":"1","generated_at":"2026-04-22T20:06:56+00:00","cve":"CVE-2021-4159","urls":{"html":"https://cve.report/CVE-2021-4159","api":"https://cve.report/api/cve/CVE-2021-4159.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-4159","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-4159"},"summary":{"title":"CVE-2021-4159","description":"A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-08-24 16:15:00","updated_at":"2022-10-06 15:30:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd","name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd","refsource":"MISC","tags":[],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/security/cve/CVE-2021-4159","name":"https://access.redhat.com/security/cve/CVE-2021-4159","refsource":"MISC","tags":[],"title":"Red Hat Customer Portal - Access to 24x7 support and knowledge","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html","name":"[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update","refsource":"MLIST","tags":[],"title":"[SECURITY] [DLA 3131-1] linux security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2036024","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2036024","refsource":"MISC","tags":[],"title":"2036024 – (CVE-2021-4159) CVE-2021-4159 kernel: another kernel ptr leak vulnerability via BPF in coerce_reg_to_size","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security-tracker.debian.org/tracker/CVE-2021-4159","name":"https://security-tracker.debian.org/tracker/CVE-2021-4159","refsource":"MISC","tags":[],"title":"CVE-2021-4159","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-4159","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4159","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"4159","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4159","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"4159","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-4159","qid":"180147","title":"Debian Security Update for linux (CVE-2021-4159)"},{"cve":"CVE-2021-4159","qid":"181091","title":"Debian Security Update for linux (DLA 3131-1)"},{"cve":"CVE-2021-4159","qid":"198980","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5668-1)"},{"cve":"CVE-2021-4159","qid":"198987","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5677-1)"},{"cve":"CVE-2021-4159","qid":"198990","title":"Ubuntu Security Notification for Linux kernel (AWS) Vulnerabilities (USN-5682-1)"},{"cve":"CVE-2021-4159","qid":"199011","title":"Ubuntu Security Notification for Linux kernel (Azure CVM) Vulnerabilities (USN-5706-1)"},{"cve":"CVE-2021-4159","qid":"199090","title":"Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5790-1)"},{"cve":"CVE-2021-4159","qid":"354071","title":"Amazon Linux Security Advisory for kernel : ALAS-2022-1636"},{"cve":"CVE-2021-4159","qid":"354075","title":"Amazon Linux Security Advisory for kernel : ALAS2-2022-1852"},{"cve":"CVE-2021-4159","qid":"354081","title":"Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-036"},{"cve":"CVE-2021-4159","qid":"377766","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2022:0049)"},{"cve":"CVE-2021-4159","qid":"377871","title":"Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2023:0001)"},{"cve":"CVE-2021-4159","qid":"671441","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1366)"},{"cve":"CVE-2021-4159","qid":"671448","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1450)"},{"cve":"CVE-2021-4159","qid":"671474","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1429)"},{"cve":"CVE-2021-4159","qid":"671630","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1647)"},{"cve":"CVE-2021-4159","qid":"671631","title":"EulerOS Security Update for kernel (EulerOS-SA-2022-1661)"},{"cve":"CVE-2021-4159","qid":"751695","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0367-1)"},{"cve":"CVE-2021-4159","qid":"751697","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0366-1)"},{"cve":"CVE-2021-4159","qid":"751700","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0363-1)"},{"cve":"CVE-2021-4159","qid":"751701","title":"OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0366-1)"},{"cve":"CVE-2021-4159","qid":"751702","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0371-1)"},{"cve":"CVE-2021-4159","qid":"751703","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0372-1)"},{"cve":"CVE-2021-4159","qid":"753212","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0363-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2021-4159","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-202 - Exposure of Sensitive Information Through Data Queries","cweId":"CWE-202"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"kernel","version":{"version_data":[{"version_affected":"=","version_value":"Fixed in v5.7-rc1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2036024","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2036024"},{"url":"https://access.redhat.com/security/cve/CVE-2021-4159","refsource":"MISC","name":"https://access.redhat.com/security/cve/CVE-2021-4159"},{"url":"https://security-tracker.debian.org/tracker/CVE-2021-4159","refsource":"MISC","name":"https://security-tracker.debian.org/tracker/CVE-2021-4159"},{"url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd","refsource":"MISC","name":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd"},{"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html","refsource":"MISC","name":"https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"}]}},"nvd":{"publishedDate":"2022-08-24 16:15:00","lastModifiedDate":"2022-10-06 15:30:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.8,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.7","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"4159","Ordinal":"223811","Title":"CVE-2021-4159","CVE":"CVE-2021-4159","Year":"2021"},"notes":[]}}}