4.4
CVSSv2

CVE-2021-40490

Published: 03/09/2021 Updated: 17/12/2021
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

A race condition exists in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel up to and including 5.13.13.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

fedoraproject fedora 33

fedoraproject fedora 34

debian debian linux 9.0

debian debian linux 11.0

netapp aff_a250_firmware -

netapp fas_500f_firmware -

netapp h300s_firmware -

netapp h500s_firmware -

netapp h700s_firmware -

netapp h300e_firmware -

netapp h500e_firmware -

netapp h700e_firmware -

netapp h410s_firmware -

netapp h410c_firmware -

netapp h610c_firmware -

netapp h610s_firmware -

netapp h615c_firmware -

Vendor Advisories

A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inlinec in the ext4 subsystem in the Linux kernel through 51313 ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2020-3702 A flaw was found in the driver for Atheros IEEE 80211n family of chipsets (ath9k) allowing information disclosure CVE-2020-16119 Hadar Manor reported a use-after-free in the D ...

Github Repositories

CVE-2021-40490 Exploit A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inlinec in the ext4 subsystem in the Linux kernel through 51313 Windows Binary PoC /CVE-2021-40490exe will run the exploit /CVE-2021-40490exe -t Target IP /CVE-2021-40490exe -t wwwexamplecom Running the exploit on Linux Change the

CVE Diff Checker diff checker主要思路是使用历史diff代码到二次开发的项目里面匹配对应的补丁是否被修改 用法: python /mainpy 你的项目代码路径 比如说项目组引入Qemu作为第三方库,然后要快速检测该版本的Qemu源码存在哪些漏洞: python /mainpy /qemu-source-521