{"vulnerability": "CVE-2021-34866", "sightings": [{"uuid": "ec1e9e20-d243-403d-b17d-91251ac94a87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34866", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8034", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2021-34866: Linux Kernel type confusion in check_map_func_compatibility() may lead to free arbitrary kernel memory.\n\nhttps://blog.hexrabbit.io/2021/11/03/CVE-2021-34866-writeup/\n\nhttps://access.redhat.com/security/cve/cve-2021-34866", "creation_timestamp": "2021-11-14T12:11:05.000000Z"}, {"uuid": "77cad90c-2751-4d74-8864-8f244b0cc101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34866", "type": "seen", "source": "https://t.me/cibsecurity/36230", "content": "\u203c CVE-2021-34866 \u203c\n\nThis vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-25T18:18:44.000000Z"}, {"uuid": "b0b69f63-85c8-4b6b-9d80-d233601ebe92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34866", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4672", "content": "#exploit\nCVE-2021-34866:\nType confusion lead to EoP\nhttps://github.com/HexRabbit/CVE-writeup/tree/master/CVE-2021-34886\n]-&gt; https://blog.hexrabbit.io/2021/11/03/CVE-2021-34866-writeup", "creation_timestamp": "2021-11-27T07:10:54.000000Z"}, {"uuid": "f5c7c789-9ae4-4a2f-b430-dbeedb6d6e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-34866", "type": "seen", "source": "https://t.me/linkersec/125", "content": "CVE-2021-34866 Writeup\n\nAn article covering exploitation of a type confusion in the eBPF subsystem. By HexRabbit. Written in Chinese.\n\nThe exploit requires having CAP_BPF (or CAP_SYS_ADMIN on older systems) in the root user namespace.", "creation_timestamp": "2021-11-06T01:51:01.000000Z"}]}