The security researcher Manfred Paul of the RedRocket CTF team released the exploit code for a high-severity privilege escalation bug, tracked as CVE-2021-3490, in Linux kernel eBPF (Extended Berkeley Packet Filter). A local attacker could exploit the flaw to escalate privileges on Ubuntu machines.
Extended Berkeley Packet Filter (eBPF) is a kernel technology (starting in Linux 4.x) that allows programs to run without having to change the kernel source code or adding additional modules. It is a sort of lightweight, sandbox virtual machine (VM) inside the Linux kernel, where programmers can run BPF bytecode that takes advantage of specific kernel resources.
Paul reported the bug in May through Trend Micro’s Zero Day Initiative, he demonstrated that user-supplied programs are not properly validated before being executed.
The security researcher Valentina Palmiotti published a blog post that contains technical details about the flaw along with the exploit code that works on fresh installs of both Ubuntu 20.10 and 21.04
She demonstrates how to exploit the issue to trigger a DoS condition of escalate privileges.
Below is a video PoC for the CVE-2021-3490 vulnerability on Ubuntu 21.04 published by the researcher:
[adrotate banner=”9″] | [adrotate banner=”12″] |
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, Linux)
[adrotate banner=”5″]
[adrotate banner=”13″]
CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…
U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…
The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…
Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…
Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…
A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…
This website uses cookies.