First published: Thu Jan 28 2021(Updated: )
A flaw was found in the Linux kernel. A use after free issue in PI futex may lead to code execution. Upstream patch: <a href="https://github.com/torvalds/linux/commit/c64396cc36c6e60704ab06c1fb1c4a46179c9120">https://github.com/torvalds/linux/commit/c64396cc36c6e60704ab06c1fb1c4a46179c9120</a> References: <a href="https://www.openwall.com/lists/oss-security/2021/01/29/1">https://www.openwall.com/lists/oss-security/2021/01/29/1</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.41.2.el6 | 0:2.6.32-754.41.2.el6 |
redhat/kernel-rt | <0:3.10.0-1160.31.1.rt56.1169.el7 | 0:3.10.0-1160.31.1.rt56.1169.el7 |
redhat/kernel-alt | <0:4.14.0-115.36.1.el7a | 0:4.14.0-115.36.1.el7a |
redhat/kernel | <0:3.10.0-1160.31.1.el7 | 0:3.10.0-1160.31.1.el7 |
redhat/kernel | <0:3.10.0-327.100.1.el7 | 0:3.10.0-327.100.1.el7 |
redhat/kernel | <0:3.10.0-514.90.2.el7 | 0:3.10.0-514.90.2.el7 |
redhat/kernel | <0:3.10.0-693.90.2.el7 | 0:3.10.0-693.90.2.el7 |
redhat/kernel | <0:3.10.0-957.78.2.el7 | 0:3.10.0-957.78.2.el7 |
redhat/kernel | <0:3.10.0-1062.56.1.el7 | 0:3.10.0-1062.56.1.el7 |
redhat/kernel-rt | <0:4.18.0-240.22.1.rt7.77.el8_3 | 0:4.18.0-240.22.1.rt7.77.el8_3 |
redhat/kernel | <0:4.18.0-240.22.1.el8_3 | 0:4.18.0-240.22.1.el8_3 |
redhat/kernel | <0:4.18.0-147.48.1.el8_1 | 0:4.18.0-147.48.1.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.51.1.rt13.101.el8_2 | 0:4.18.0-193.51.1.rt13.101.el8_2 |
redhat/kernel | <0:4.18.0-193.51.1.el8_2 | 0:4.18.0-193.51.1.el8_2 |
IBM Data Risk Manager | <=2.0.6 | |
Android | ||
Linux Kernel | <=5.10.11 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Red Hat Fedora | =32 | |
Red Hat Fedora | =33 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3347 has a high severity level due to the potential for code execution through a use after free vulnerability.
To fix CVE-2021-3347, apply the latest kernel patches and updates provided by your distribution.
CVE-2021-3347 affects multiple versions of the Linux kernel, particularly those prior to the patched versions listed by Red Hat and other distributions.
The potential impacts of CVE-2021-3347 include arbitrary code execution, which could lead to system compromise or unauthorized access.
At the time of reporting, there was potential for exploitation, but specific exploit details require careful management to prevent misuse.