A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1950136 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a | Mailing List Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20210618-0008/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2021-05-05T22:31:28
Updated: 2021-06-18T09:06:23
Reserved: 2021-04-15T00:00:00
Link: CVE-2021-3501
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-06T13:15:12.840
Modified: 2022-05-13T20:52:55.127
Link: CVE-2021-3501
JSON object: View
Redhat Information
No data.
CWE