Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-4083

Опубликовано: 03 дек. 2021
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2022:119905.04.2022
Red Hat Enterprise Linux 7kpatch-patchFixedRHSA-2022:118505.04.2022
Red Hat Enterprise Linux 7kernelFixedRHSA-2022:119805.04.2022
Red Hat Enterprise Linux 7.3 Advanced Update SupportkernelFixedRHSA-2022:218911.05.2022
Red Hat Enterprise Linux 7.4 Advanced Update SupportkernelFixedRHSA-2022:110429.03.2022
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)kernelFixedRHSA-2022:110729.03.2022
Red Hat Enterprise Linux 7.6 Telco Extended Update SupportkernelFixedRHSA-2022:110729.03.2022
Red Hat Enterprise Linux 7.6 Update Services for SAP Solutionskpatch-patchFixedRHSA-2022:110329.03.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-362
https://bugzilla.redhat.com/show_bug.cgi?id=2029923kernel: fget: check that the fd still exists after getting a ref to it

EPSS

Процентиль: 1%
0.00008
Низкий

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7
ubuntu
больше 3 лет назад

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

CVSS3: 7
nvd
больше 3 лет назад

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

CVSS3: 7
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7
debian
больше 3 лет назад

A read-after-free memory flaw was found in the Linux kernel's garbage ...

CVSS3: 7
github
больше 3 лет назад

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.

EPSS

Процентиль: 1%
0.00008
Низкий

7.4 High

CVSS3

Уязвимость CVE-2021-4083