First published: Tue Mar 23 2021(Updated: )
Last updated 11 April 2025
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.4.101 | |
Linux Kernel | >=5.5.0<5.10.19 | |
Linux Kernel | >=5.11<5.11.2 | |
Debian Linux | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 |
Apply or update to a kernel that contains the commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero").
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3444 is considered to have a high severity due to its potential for exploitation leading to out-of-bounds reads in kernel memory.
To fix CVE-2021-3444, you should upgrade to the patched versions of the Linux kernel as specified by your distribution.
CVE-2021-3444 affects kernel versions prior to 5.10.19, and also between 5.11 and 5.11.2.
CVE-2021-3444 requires a local attacker with the ability to load BPF programs, therefore it is not a remote exploit.
The exploitation of CVE-2021-3444 can lead to unauthorized access to kernel memory, which may expose sensitive information or lead to further system compromises.