CVE-2021-3347
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with local access to a Linux system to run malicious code in the kernel, potentially taking control of the system. It occurs due to a flaw in how the kernel handles certain errors, and it affects versions of the Linux kernel up to 5.10.11.
Technical Description
An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jan 29, 2021
about 5 years ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
linux
Product
linux kernel
Related Vulnerabilities
This vulnerability allows an attacker to exploit the Linux kernel's scheduling system to insert a class into a data structure twice, potentially causing the system to enter an infinite loop and prevent packet processing. To take advantage of this, the attacker must use specific configurations with the Hierarchical Fair Service Curve (HFSC) and Token Bucket Filter (TBF) settings.
This vulnerability allows an attacker to potentially manipulate memory in the Linux kernel, which could lead to unexpected behavior or crashes in applications using the io_uring interface. It occurs when an old buffer structure is reused improperly after being emptied, which could happen under specific conditions when upgrading buffer settings.
This vulnerability allows a local attacker to potentially take control of the system or corrupt its memory by exploiting a flaw in the way the Linux kernel handles certain operations when a filesystem is being unmounted. To take advantage of this, the attacker must have local access to the system and create a specific type of operation called a futex.