CVE-2021-4083

Updated: 2024-11-22 03:35:12.555006

Description:

A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 6.9
CVSS Version 3.x HIGH 7

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.0 HIGH Not Vulnerable 2024-04-18 10:11:06
AlmaLinux 9.2 FIPS kernel 5.14.0 7.0 HIGH Not Vulnerable 2024-04-18 10:10:01
CentOS 6 ELS kernel 2.6.32 7.0 HIGH Released CLSA-2022:1650377052 2022-05-04 13:10:37
CentOS 7 ELS kernel 3.10.0 7.0 HIGH Already Fixed 2024-01-20 08:41:02
CentOS 8.4 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2024:1731430561 2022-04-28 15:59:32
CentOS 8.5 ELS kernel 4.18.0 7.0 HIGH Released CLSA-2024:1731431059 2022-04-28 15:59:01
CentOS Stream 8 ELS kernel 4.18.0 7.0 HIGH Already Fixed 2024-06-09 11:20:37
CloudLinux 6 ELS kernel 2.6.32 7.0 HIGH Released CLSA-2023:1687202317 2024-04-09 11:33:09
CloudLinux 7 ELS kernel 3.10.0 7.0 HIGH Needs Triage 2024-09-06 04:49:43
Oracle Linux 6 ELS kernel 2.6.32 7.0 HIGH Released CLSA-2022:1669850228 2022-11-30 19:56:24
Total: 13