Vulnerability Name: | CVE-2021-4203 (CCN-222609) | ||||||||||||||||||||
Assigned: | 2021-09-29 | ||||||||||||||||||||
Published: | 2021-09-29 | ||||||||||||||||||||
Updated: | 2022-12-08 | ||||||||||||||||||||
Summary: | A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information. | ||||||||||||||||||||
CVSS v3 Severity: | 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H) 5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C)
5.1 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.9 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:N/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-4203 Source: secalert@redhat.com Type: Exploit, Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: XF Type: UNKNOWN linux-kernel-cve20214203-dos(222609) Source: CCN Type: Linux Kernel GIT Repository af_unix: fix races in sk_peer_pid and sk_peer_cred accesses Source: secalert@redhat.com Type: Patch, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Mailing List, Patch, Vendor Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: IBM Security Bulletin 6593539 (Spectrum Copy Data Management) Vulnerabilities in the Linux Kernel affect IBM Spectrum Copy Data Management Source: CCN Type: IBM Security Bulletin 6596971 (Spectrum Protect Plus) Multiple vulnerabilities in Linux Kernel affect IBM Spectrum Protect Plus Source: CCN Type: IBM Security Bulletin 6615961 (Elastic Storage System) Linux Kernel vulnerability may affect IBM Elastic Storage System (CVE-2021-4203) Source: secalert@redhat.com Type: Patch, Third Party Advisory secalert@redhat.com Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-4203 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |