Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-4028

Опубликовано: 04 окт. 2021
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelAffected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2022:119905.04.2022
Red Hat Enterprise Linux 7kpatch-patchFixedRHSA-2022:118505.04.2022
Red Hat Enterprise Linux 7kernelFixedRHSA-2022:119805.04.2022
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2022:218911.05.2022
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2022:218811.05.2022
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)kernelFixedRHSA-2022:218611.05.2022
Red Hat Enterprise Linux 7.6 Telco Extended Update SupportkernelFixedRHSA-2022:218611.05.2022
Red Hat Enterprise Linux 7.6 Update Services for SAP SolutionskernelFixedRHSA-2022:218611.05.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2027201kernel: use-after-free in RDMA listen()

EPSS

Процентиль: 7%
0.00029
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 3 года назад

A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

CVSS3: 7.8
nvd
почти 3 года назад

A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

CVSS3: 7.8
debian
почти 3 года назад

A flaw in the Linux kernel's implementation of RDMA communications man ...

CVSS3: 7.8
github
почти 3 года назад

A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.

CVSS3: 7
fstec
больше 3 лет назад

Уязвимость менеджера соединений RDMA ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 7%
0.00029
Низкий

7 High

CVSS3

Уязвимость CVE-2021-4028