First published: Mon Oct 04 2021(Updated: )
Last updated 24 March 2025
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=2.6.12<4.4.282 | |
Linux Kernel | >=4.5<4.9.281 | |
Linux Kernel | >=4.10<4.14.245 | |
Linux Kernel | >=4.15<4.19.205 | |
Linux Kernel | >=4.20<5.4.143 | |
Linux Kernel | >=5.5<5.10.61 | |
Linux Kernel | >=5.11<5.13.13 | |
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
All of | ||
NetApp H500S Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700E | ||
NetApp H700E | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
All of | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
All of | ||
NetApp SolidFire Baseboard Management Controller Firmware | ||
NetApp SolidFire | ||
Debian Linux | =9.0 | |
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
NetApp H700S | ||
NetApp H700S | ||
NetApp H300E | ||
NetApp H300E Firmware | ||
NetApp H500S Firmware | ||
NetApp H500e Firmware | ||
NetApp H700E | ||
NetApp H700E | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
NetApp SolidFire Baseboard Management Controller Firmware | ||
NetApp SolidFire | ||
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42008 is classified as a critical vulnerability because it allows for a slab out-of-bounds write that can lead to root access.
To fix CVE-2021-42008, upgrade the Linux kernel to version 5.13.13 or later.
CVE-2021-42008 affects Linux kernel versions prior to 5.13.13.
The potential impacts of CVE-2021-42008 include unauthorized root access and system compromise.
CVE-2021-42008 can be exploited by any process with the CAP_NET_ADMIN capability.