An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Fedoraproject Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Extras Rt Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2557-1 linux-4.19 security update
Debian DLA Debian DLA DLA-2586-1 linux security update
Debian DSA Debian DSA DSA-4843-1 linux security update
EUVD EUVD EUVD-2021-26678 An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
Ubuntu USN Ubuntu USN USN-4878-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4884-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-4907-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4910-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://www.openwall.com/lists/oss-security/2021/01/29/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/01/29/5 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/02/01/4 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120 cve-icon cve-icon
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2021-3347 cve-icon
https://security.netapp.com/advisory/ntap-20210304-0005/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2021-3347 cve-icon
https://www.debian.org/security/2021/dsa-4843 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2021/01/29/1 cve-icon cve-icon
https://www.openwall.com/lists/oss-security/2021/01/29/3 cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-07-24T03:55:31.294Z

Reserved: 2021-01-29T00:00:00.000Z

Link: CVE-2021-3347

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-01-29T17:15:12.950

Modified: 2024-11-21T06:21:21.037

Link: CVE-2021-3347

cve-icon Redhat

Severity : Important

Publid Date: 2021-01-28T00:00:00Z

Links: CVE-2021-3347 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses