nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2610-1 | linux-4.19 security update |
EUVD |
EUVD-2021-26679 | nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71. |
Ubuntu USN |
USN-4884-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-4907-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4909-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4910-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T16:53:17.319Z
Reserved: 2021-02-01T00:00:00
Link: CVE-2021-3348
No data.
Status : Modified
Published: 2021-02-01T04:15:14.430
Modified: 2024-11-21T06:21:21.300
Link: CVE-2021-3348
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN