A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2941-1 | linux-4.19 security update |
![]() |
DSA-5096-1 | linux security update |
![]() |
EUVD-2021-34061 | A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information. |
![]() |
USN-6001-1 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6013-1 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6014-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:16:04.262Z
Reserved: 2022-01-10T00:00:00
Link: CVE-2021-4203

No data.

Status : Modified
Published: 2022-03-25T19:15:09.833
Modified: 2024-11-21T06:37:08.430
Link: CVE-2021-4203


No data.