First published: Fri Jun 04 2021(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | >=5.10<5.10.37 | |
Linux kernel | >=5.11<5.11.21 | |
Linux kernel | >=5.12<5.12.4 | |
Linux kernel | =5.13 | |
Linux kernel | =5.13-rc1 | |
Linux kernel | =5.13-rc2 | |
Linux kernel | =5.13-rc3 | |
Ubuntu | =20.04 | |
Ubuntu | =20.10 | |
Ubuntu | =21.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3490 is considered a high severity vulnerability due to its potential for arbitrary code execution in the Linux kernel.
To mitigate CVE-2021-3490, update your Linux kernel to a version that addresses this vulnerability, such as 5.10.223-1 or later.
CVE-2021-3490 affects Linux kernel versions between 5.10 and 5.13, including specific release candidates.
CVE-2021-3490 is classified as a memory corruption vulnerability that stems from improper bounds tracking.
CVE-2021-3490 requires local access to the system for exploitation, making it a local privilege escalation issue.