Link | Resource |
---|---|
https://ubuntu.com/security/notices/USN-4949-1 | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-606/ | Third Party Advisory VDB Entry |
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=049c4e13714ecbca567b4d5f6d563f05d431c80e | Patch Vendor Advisory |
https://ubuntu.com/security/notices/USN-4950-1 | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2021/05/11/11 | Mailing List Patch |
https://security.netapp.com/advisory/ntap-20210716-0004/ | Third Party Advisory |
http://packetstormsecurity.com/files/164015/Linux-eBPF-ALU32-32-bit-Invalid-Bounds-Tracking-Local-Privilege-Escalation.html | Exploit Third Party Advisory |
Configuration 1
|
Published : 2021-06-04 02:15
Updated : 2021-09-14 02:31
NVD link : CVE-2021-3490
Mitre link : CVE-2021-3490