First published: Fri Apr 09 2021(Updated: )
A flaw was found in the Nosy driver in the Linux kernel in versions prior to v5.12-rc6. It allows a device to be inserted twice into a doubly linked list, leading to use-after-free when one of these devices is removed. Reference: <a href="https://www.openwall.com/lists/oss-security/2021/04/07/1">https://www.openwall.com/lists/oss-security/2021/04/07/1</a> Upstream patch: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=829933ef05a951c8ff140e814656d73e74915faf">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=829933ef05a951c8ff140e814656d73e74915faf</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.12 | 5.12 |
Linux Kernel | <5.12 | |
Linux Kernel | =5.12-rc1 | |
Linux Kernel | =5.12-rc2 | |
Linux Kernel | =5.12-rc3 | |
Linux Kernel | =5.12-rc4 | |
Linux Kernel | =5.12-rc5 | |
Debian GNU/Linux | =9.0 | |
netapp cloud backup | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3483 has been rated as a moderate severity vulnerability due to the risk of use-after-free conditions.
To fix CVE-2021-3483, you should upgrade your Linux kernel to version 5.12 or later.
CVE-2021-3483 affects all Linux kernel versions prior to 5.12-rc6.
Yes, Debian Linux versions using kernels below 5.12 are vulnerable to CVE-2021-3483.
CVE-2021-3483 impacts systems using vulnerable versions of the Linux kernel, specifically those with the Nosy driver.