Files
CVEs-PoC/2021/CVE-2021-3501.md
2025-09-29 21:09:30 +02:00

18 lines
887 B
Markdown

### [CVE-2021-3501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3501)
![](https://img.shields.io/static/v1?label=Product&message=kernel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Linux%20kernel%205.12%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787&color=brightgreen)
### Description
A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability.
### POC
#### Reference
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
#### Github
No PoCs found on GitHub currently.