First published: Thu Jan 28 2021(Updated: )
A flaw was found in the Linux kernel. A race codition in nbd ioctl may lead to a use-after-free read in nbd_queue_rq causing a crash. Upstream patch: <a href="https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/">https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/</a> References: <a href="https://www.openwall.com/lists/oss-security/2021/01/28/3">https://www.openwall.com/lists/oss-security/2021/01/28/3</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=5.10.12 | |
Debian Linux | =9.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 6.12.27-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3348 has been classified as a moderate severity vulnerability.
To fix CVE-2021-3348, upgrade to a kernel version that is 5.10.223-1 or later, or 6.1.119-1 or later.
CVE-2021-3348 affects Linux Kernel versions up to and including 5.10.12 and Debian Linux version 9.0.
CVE-2021-3348 is a use-after-free vulnerability due to a race condition in the nbd ioctl.
Yes, CVE-2021-3348 can lead to a system crash due to a use-after-free read in nbd_queue_rq.