CVE-2021-4203Race Condition in Kernel

Severity
6.8MEDIUMNVD
EPSS
0.1%
top 74.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25
Latest updateApr 12

Description

A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.6 | Impact: 5.2

Affected Packages7 packages

Patches

🔴Vulnerability Details

3
GHSA
GHSA-rh28-76xv-jcqc: A use-after-free read flaw was found in sock_getsockopt() in net/core/sock2022-03-26
OSV
CVE-2021-4203: A use-after-free read flaw was found in sock_getsockopt() in net/core/sock2022-03-25
CVEList
CVE-2021-4203: A use-after-free read flaw was found in sock_getsockopt() in net/core/sock2022-03-25

📋Vendor Advisories

6
Ubuntu
Linux kernel (AWS) vulnerabilities2023-04-12
Ubuntu
Linux kernel vulnerabilities2023-04-12
Ubuntu
Linux kernel (AWS) vulnerabilities2023-04-06
Microsoft
A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw an attacker with 2022-03-08
Red Hat
kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses2021-09-29
CVE-2021-4203 — Race Condition in Linux Kernel | cvebase