### [CVE-2021-3501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3501) ![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Linux%20kernel%205.12%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787&color=brightgreen) ### Description A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability. ### POC #### Reference - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a #### Github No PoCs found on GitHub currently.