Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-4203

Опубликовано: 25 мар. 2022
Источник: debian
EPSS Низкий

Описание

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.14.12-1package
linuxfixed5.10.84-1bullseyepackage
linuxfixed4.9.290-1stretchpackage

Примечания

  • https://bugs.chromium.org/p/project-zero/issues/detail?id=2230

  • https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)

EPSS

Процентиль: 15%
0.00049
Низкий

Связанные уязвимости

CVSS3: 6.8
ubuntu
около 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVSS3: 5.8
redhat
больше 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVSS3: 6.8
nvd
около 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVSS3: 6.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 6.8
github
около 3 лет назад

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

EPSS

Процентиль: 15%
0.00049
Низкий