CVE-2021-3429

Vulnerability updated 4 months ago (2024-05-04T16:29:05.587Z)
Download STIX
Preview STIX
CVE-2021-3429 is a vulnerability that was discovered in the Linux kernel's implementation of splice() system call. This vulnerability affects all Linux kernel versions starting from 5.5 and up to version 5.12.13. The flaw could allow an attacker to gain elevated privileges or execute arbitrary code on a vulnerable system. The vulnerability occurs due to an insufficient validation check in the splice() system call, which allows an attacker to write data beyond the end of a pipe buffer. This behavior can potentially overwrite adjacent kernel memory and enable the attacker to execute malicious code or cause a denial-of-service (DoS) attack. When CVE-2021-3429 was initially disclosed, many Linux distributions quickly released security updates to mitigate the vulnerability. However, some organizations may have delayed patching, leaving their systems exposed to potential attacks. It's crucial for organizations to prioritize patching vulnerabilities like CVE-2021-3429 promptly to prevent exploitation by attackers.
Description last updated: 2023-06-23T18:17:51.603Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the CVE-2021-3429 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
SUSE update for cloud-init