CVE-2021-3347
kernel: Use after free via PI futex state
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
Se detectó un problema en el kernel de Linux versiones hasta 5.10.11. Los futexes de PI presentan un uso de la memoria previamente liberada de la pila del kernel durante el manejo de fallos, permitiendo a usuarios locales ejecutar código en el kernel, también se conoce como CID-34b1a1ce1458
A flaw was found in the Linux kernel. A use-after-free memory flaw in the Fast Userspace Mutexes functionality allowing a local user to crash the system or escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-29 CVE Reserved
- 2021-01-29 CVE Published
- 2022-04-26 First Exploit
- 2023-03-08 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-416: Use After Free
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2021/01/29/4 | Mailing List | |
http://www.openwall.com/lists/oss-security/2021/01/29/5 | Mailing List | |
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20210304-0005 | Third Party Advisory | |
https://www.openwall.com/lists/oss-security/2021/01/29/1 | Mailing List | |
https://www.openwall.com/lists/oss-security/2021/01/29/3 | Mailing List |
URL | Date | SRC |
---|---|---|
https://github.com/nanopathi/linux-4.19.72_CVE-2021-3347 | 2022-04-26 | |
http://www.openwall.com/lists/oss-security/2021/02/01/4 | 2024-08-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 5.10.11 Search vendor "Linux" for product "Linux Kernel" and version " <= 5.10.11" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 32 Search vendor "Fedoraproject" for product "Fedora" and version "32" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
|