{"id":"CVE-2021-3490","details":"The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).","aliases":["A-190876666","PUB-A-190876666"],"modified":"2026-03-15T22:37:20.176317Z","published":"2021-06-04T02:15:07.150Z","related":["SUSE-SU-2021:1975-1","SUSE-SU-2021:1977-1","SUSE-SU-2021:2198-1","openSUSE-SU-2021:1975-1","openSUSE-SU-2021:1977-1","openSUSE-SU-2024:10728-1","openSUSE-SU-2024:13704-1"],"references":[{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-21-606/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210716-0004/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4949-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4950-1"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=049c4e13714ecbca567b4d5f6d563f05d431c80e"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2021/05/11/11"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3490.json","unresolved_ranges":[{"events":[{"introduced":"5.10"},{"fixed":"5.10.37"}]},{"events":[{"introduced":"5.11"},{"fixed":"5.11.21"}]},{"events":[{"introduced":"5.12"},{"fixed":"5.12.4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.13-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.10"}]},{"events":[{"introduced":"0"},{"last_affected":"21.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}