Description
nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2610-1 | linux-4.19 security update |
EUVD |
EUVD-2021-26679 | nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. |
Ubuntu USN |
USN-4884-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-4907-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4909-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4910-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T16:53:17.319Z
Reserved: 2021-02-01T00:00:00.000Z
Link: CVE-2021-3348
No data.
Status : Modified
Published: 2021-02-01T04:15:14.430
Modified: 2024-11-21T06:21:21.300
Link: CVE-2021-3348
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN