{"id":"CVE-2021-3347","details":"An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.","aliases":["A-171705902","ASB-A-171705902"],"modified":"2026-04-16T04:37:25.527467349Z","published":"2021-01-29T17:15:12.950Z","related":["ALSA-2021:1093","SUSE-SU-2021:0347-1","SUSE-SU-2021:0348-1","SUSE-SU-2021:0353-1","SUSE-SU-2021:0354-1","SUSE-SU-2021:0427-1","SUSE-SU-2021:0433-1","SUSE-SU-2021:0434-1","SUSE-SU-2021:0437-1","SUSE-SU-2021:0438-1","SUSE-SU-2021:0452-1","SUSE-SU-2021:0532-1","SUSE-SU-2021:0809-1","SUSE-SU-2021:0818-1","SUSE-SU-2021:0823-1","SUSE-SU-2021:0826-1","SUSE-SU-2021:0840-1","SUSE-SU-2021:0841-1","SUSE-SU-2021:0842-1","SUSE-SU-2021:0849-1","SUSE-SU-2021:0853-1","SUSE-SU-2021:0859-1","SUSE-SU-2021:0868-1","SUSE-SU-2021:0870-1","SUSE-SU-2021:14630-1","openSUSE-SU-2021:0241-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/01/29/5"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/01/29/4"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2021/01/29/3"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20210304-0005/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4843"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2021/01/29/1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2021/02/01/4"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.10.11"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3347.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}