A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2941-1 | linux-4.19 security update |
Debian DSA |
DSA-5096-1 | linux security update |
EUVD |
EUVD-2021-34061 | A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information. |
Ubuntu USN |
USN-6001-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6013-1 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-6014-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T17:16:04.262Z
Reserved: 2022-01-10T00:00:00
Link: CVE-2021-4203
No data.
Status : Modified
Published: 2022-03-25T19:15:09.833
Modified: 2024-11-21T06:37:08.430
Link: CVE-2021-4203
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN