Lucene search

K
nvd[email protected]NVD:CVE-2021-4203
HistoryMar 25, 2022 - 7:15 p.m.

CVE-2021-4203

2022-03-2519:15:09
CWE-362
CWE-416
web.nvd.nist.gov
5
use-after-free
sock_getsockopt
so_peercred
so_peergroups
race
kernel information
linux

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:N/A:P

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H

EPSS

0.002

Percentile

53.0%

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

Affected configurations

Nvd
Node
linuxlinux_kernelRange<5.15
OR
linuxlinux_kernelMatch5.15-
OR
linuxlinux_kernelMatch5.15rc1
OR
linuxlinux_kernelMatch5.15rc2
OR
linuxlinux_kernelMatch5.15rc3
Node
netappactive_iq_unified_managerMatch-vmware_vsphere
OR
netappe-series_santricity_os_controllerRange11.0.011.70.2
OR
netappelement_softwareMatch-
OR
netapphci_management_nodeMatch-
OR
netappsolidfireMatch-
Node
netappbootstrap_osMatch-
AND
netapphci_compute_nodeMatch-
Node
netappa700s_firmwareMatch-
AND
netappa700sMatch-
Node
netapph300s_firmwareMatch-
AND
netapph300sMatch-
Node
netapph500s_firmwareMatch-
AND
netapph500sMatch-
Node
netapph700s_firmwareMatch-
AND
netapph700sMatch-
Node
netapph410s_firmwareMatch-
AND
netapph410sMatch-
Node
netapph410c_firmwareMatch-
AND
netapph410cMatch-
Node
oraclecommunications_cloud_native_core_binding_support_functionMatch22.1.3
OR
oraclecommunications_cloud_native_core_network_exposure_functionMatch22.1.1
OR
oraclecommunications_cloud_native_core_policyMatch22.2.0

CVSS2

4.9

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:N/A:P

CVSS3

6.8

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H

EPSS

0.002

Percentile

53.0%