First published: Thu Jun 10 2021(Updated: )
An out-of-bounds write flaw was found in the Linux kernel's seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash, leak of internal kernel information and can escalate privileges. The issue results from not validating the size_t-to-int conversion prior to performing operations. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.41.2.el6 | 0:2.6.32-754.41.2.el6 |
redhat/kernel-rt | <0:3.10.0-1160.36.2.rt56.1179.el7 | 0:3.10.0-1160.36.2.rt56.1179.el7 |
redhat/kernel | <0:3.10.0-1160.36.2.el7 | 0:3.10.0-1160.36.2.el7 |
redhat/kernel | <0:3.10.0-327.98.2.el7 | 0:3.10.0-327.98.2.el7 |
redhat/kernel | <0:3.10.0-514.90.2.el7 | 0:3.10.0-514.90.2.el7 |
redhat/kernel | <0:3.10.0-693.90.2.el7 | 0:3.10.0-693.90.2.el7 |
redhat/kernel | <0:3.10.0-957.78.2.el7 | 0:3.10.0-957.78.2.el7 |
redhat/kernel | <0:3.10.0-1062.52.2.el7 | 0:3.10.0-1062.52.2.el7 |
redhat/kernel-rt | <0:4.18.0-305.10.2.rt7.83.el8_4 | 0:4.18.0-305.10.2.rt7.83.el8_4 |
redhat/kernel | <0:4.18.0-305.10.2.el8_4 | 0:4.18.0-305.10.2.el8_4 |
redhat/kernel | <0:4.18.0-147.51.2.el8_1 | 0:4.18.0-147.51.2.el8_1 |
redhat/kernel-rt | <0:4.18.0-193.60.2.rt13.112.el8_2 | 0:4.18.0-193.60.2.rt13.112.el8_2 |
redhat/kernel | <0:4.18.0-193.60.2.el8_2 | 0:4.18.0-193.60.2.el8_2 |
redhat/redhat-virtualization-host | <0:4.3.17-20210713.0.el7_9 | 0:4.3.17-20210713.0.el7_9 |
redhat/redhat-virtualization-host | <0:4.4.7-20210715.1.el8_4 | 0:4.4.7-20210715.1.el8_4 |
Linux Linux kernel | >=3.12.43<3.13 | |
Linux Linux kernel | >=3.16<4.4.276 | |
Linux Linux kernel | >=4.5<4.9.276 | |
Linux Linux kernel | >=4.10<4.14.240 | |
Linux Linux kernel | >=4.15<4.19.198 | |
Linux Linux kernel | >=4.20<5.4.134 | |
Linux Linux kernel | >=5.5<5.10.52 | |
Linux Linux kernel | >=5.11<5.12.19 | |
Linux Linux kernel | >=5.13<5.13.4 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Netapp Hci Management Node | ||
Netapp Solidfire | ||
Oracle Communications Session Border Controller | =8.2 | |
Oracle Communications Session Border Controller | =8.3 | |
Oracle Communications Session Border Controller | =8.4 | |
Oracle Communications Session Border Controller | =9.0 | |
Sonicwall Sma1000 Firmware | <=12.4.2-02044 | |
SonicWall SMA1000 | ||
redhat/kernel | <5.14 | 5.14 |
All of | ||
Sonicwall Sma1000 Firmware | <=12.4.2-02044 | |
SonicWall SMA1000 | ||
Google Android | ||
IBM DRM | <=2.0.6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)