CVE-2021-4202

A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/06/01/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/06/04/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/06/07/2 Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2036682 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102 Exploit Patch Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406 Exploit Patch Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15 Exploit Patch Vendor Advisory
https://security.netapp.com/advisory/ntap-20220513-0002/ Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/06/01/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/06/04/2 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/06/07/2 Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2036682 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102 Exploit Patch Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406 Exploit Patch Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15 Exploit Patch Vendor Advisory
https://security.netapp.com/advisory/ntap-20220513-0002/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:37

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2022/06/01/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/06/01/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/06/04/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/06/04/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/06/07/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2022/06/07/2 - Mailing List, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2036682 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2036682 - Issue Tracking, Patch, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102 - Exploit, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3e3b5dfcd16a3e254aab61bd1e8c417dd4503102 - Exploit, Patch, Vendor Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406 - Exploit, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48b71a9e66c2eab60564b1b1c85f4928ed04e406 - Exploit, Patch, Vendor Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15 - Exploit, Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=86cdf8e38792545161dbe3350a7eced558ba4d15 - Exploit, Patch, Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20220513-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220513-0002/ - Third Party Advisory

04 Aug 2023, 17:23

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*

Information

Published : 2022-03-25 19:15

Updated : 2024-11-21 06:37


NVD link : CVE-2021-4202

Mitre link : CVE-2021-4202

CVE.ORG link : CVE-2021-4202


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

CWE-416

Use After Free