{"id":"CVE-2021-3600","details":"It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code.","modified":"2026-03-13T05:04:13.903450Z","published":"2024-01-08T19:15:08.470Z","related":["ALSA-2021:4356"],"references":[{"type":"WEB","url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5003-1"},{"type":"FIX","url":"https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-3600.json","unresolved_ranges":[{"events":[{"introduced":"4.14.115"},{"fixed":"4.14.308"}]},{"events":[{"introduced":"4.15"},{"fixed":"4.19.206"}]},{"events":[{"introduced":"4.20"},{"fixed":"5.4.98"}]},{"events":[{"introduced":"5.5"},{"fixed":"5.10.16"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc6"}]},{"events":[{"introduced":"0"},{"last_affected":"5.11-rc7"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}