First published: Sun Mar 28 2021(Updated: )
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <5.12.0 | 5.12.0 |
Linux Kernel | <5.12 | |
Linux Kernel | =5.12 | |
Linux Kernel | =5.12-rc1 | |
Linux Kernel | =5.12-rc2 | |
Linux Kernel | =5.12-rc3 | |
Debian GNU/Linux | =9.0 | |
netapp cloud backup | ||
netapp solidfire baseboard management controller firmware | ||
All of | ||
netapp h300s firmware | ||
netapp h300s | ||
All of | ||
NetApp H500S Firmware | ||
netapp h500s | ||
All of | ||
netapp h700s firmware | ||
netapp h700s | ||
All of | ||
netapp h300e firmware | ||
netapp h300e | ||
All of | ||
netapp h500e firmware | ||
netapp h500e | ||
All of | ||
netapp h700e firmware | ||
netapp h700e | ||
All of | ||
netapp h410s firmware | ||
netapp h410s | ||
All of | ||
netapp h410c firmware | ||
netapp h410c | ||
netapp h300s firmware | ||
netapp h300s | ||
NetApp H500S Firmware | ||
netapp h500s | ||
netapp h700s firmware | ||
netapp h700s | ||
netapp h300e firmware | ||
netapp h300e | ||
netapp h500e firmware | ||
netapp h500e | ||
netapp h700e firmware | ||
netapp h700e | ||
netapp h410s firmware | ||
netapp h410s | ||
netapp h410c firmware | ||
netapp h410c | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3506 is considered a high severity vulnerability due to its potential to allow local attackers to gain access to sensitive memory and cause system crashes.
To fix CVE-2021-3506, upgrade to kernel version 5.12.0-rc4 or later for the Linux kernel.
CVE-2021-3506 affects Linux kernel versions prior to 5.12.0-rc4.
No, CVE-2021-3506 is not remotely exploitable and requires local access to the system.
The impact of CVE-2021-3506 includes the potential for system crashes and leakage of internal kernel information due to out-of-bounds memory access.