First published: Tue Mar 09 2021(Updated: )
A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.9 | 5.9 |
Linux Kernel | <5.9.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3428 has been assigned a high severity due to its potential for causing denial of service.
To fix CVE-2021-3428, update the Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
CVE-2021-3428 affects Linux kernel versions up to 5.9.0.
CVE-2021-3428 can be exploited by a local attacker with special user privileges.
CVE-2021-3428 is associated with a denial of service attack due to a crafted ext4 filesystem.