A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2022/06/01/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2022/06/04/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2022/06/07/2 - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2036682 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102 - Exploit, Patch, Vendor Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406 - Exploit, Patch, Vendor Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15 - Exploit, Patch, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20220513-0002/ - Third Party Advisory |
04 Aug 2023, 17:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:* |
Information
Published : 2022-03-25 19:15
Updated : 2024-11-21 06:37
NVD link : CVE-2021-4202
Mitre link : CVE-2021-4202
CVE.ORG link : CVE-2021-4202
JSON object : View
Products Affected
linux
- linux_kernel