First published: Tue May 11 2021(Updated: )
Last updated 24 July 2024
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=5.7<5.10.37 | |
Linux kernel | >=5.11<5.11.21 | |
Linux kernel | >=5.12<5.12.4 | |
Ubuntu Linux | =20.04 | |
Ubuntu Linux | =20.10 | |
Ubuntu Linux | =21.04 | |
Ubuntu Unattended Upgrades | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.21-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3491 is considered a high severity vulnerability due to the potential for heap overflow.
To fix CVE-2021-3491, upgrade to the patched kernel versions such as 5.10.223-1 or higher.
CVE-2021-3491 affects multiple versions of the Linux kernel, particularly those between 5.7 and 5.12.4.
CVE-2021-3491 may allow local users to exploit the vulnerability, but is not classified as a remote exploitation vulnerability.
Exploiting CVE-2021-3491 could lead to unauthorized access to memory and potentially allow attackers to execute arbitrary code.