Updated: 2026-03-05 04:12:22.008829
Description:
A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | MEDIUM | 4.6 |
| CVSS Version 3.x | MEDIUM | 6.7 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| CentOS 6 ELS | kernel | 2.6.32 | 6.7 | MEDIUM | Not Vulnerable | 2021-11-02 14:03:17 | Not affected. CVE-2021-3411 targets the x86 kprobes “jump optimization” path (arch/x86/kernel/kp... | |
| CentOS 7 ELS | kernel | 3.10.0 | 6.7 | MEDIUM | Ignored | 2023-09-19 09:30:25 | Ignored due to low severity | |
| CentOS 8.4 ELS | kernel | 4.18.0 | 6.7 | MEDIUM | Ignored | 2022-02-10 08:36:41 | Ignored due to low severity | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 6.7 | MEDIUM | Not Vulnerable | 2025-10-24 07:19:08 | CVE-2021-3411 affects only the x86 kprobes optimizer code path (arch/x86/kernel/kprobes/opt.c) and i... | |
| CloudLinux 6 ELS | kernel | 2.6.32 | 6.7 | MEDIUM | Ignored | 2022-01-27 11:20:09 | Ignored due to low severity | |
| Oracle Linux 6 ELS | kernel | 2.6.32 | 6.7 | MEDIUM | Ignored | 2022-01-27 11:20:08 | Ignored due to low severity | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 6.7 | MEDIUM | Ignored | 2022-09-28 05:02:47 | Ignored due to low severity | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 6.7 | MEDIUM | Ignored | 2022-01-27 11:20:08 | Ignored due to low severity | |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 6.7 | MEDIUM | Ignored | 2023-03-02 04:04:02 | Ignored due to low severity |