CVE-2021-3995

Summary

CVECVE-2021-3995
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2022-08-23 20:15:00 UTC
Updated2024-01-07 09:15:00 UTC
DescriptionA logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.

Risk And Classification

Problem Types: CWE-552

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Fedoraproject Fedora 35 All All All
Application Kernel Util-linux All All All All

References

ReferenceSourceLinkTags
snap-confine must_mkdir_and_open_with_perms() Race Condition ≈ Packet Storm MISC packetstormsecurity.com
August 2022 Util-linux Vulnerabilities in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
Invalid Bug ID MISC bugzilla.redhat.com
mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes MISC mirrors.edge.kernel.org
Full Disclosure: Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) FULLDISC seclists.org
oss-security - Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328) MLIST www.openwall.com
oss-security - CVE-2021-3996 and CVE-2021-3995 in util-linux's libmount MISC www.openwall.com
GLSA-202401-08 security.gentoo.org
libmount: fix UID check for FUSE umount [CVE-2021-3995] · util-linux/util-linux@57202f5 · GitHub MISC github.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 179023 Debian Security Update for util-linux (DSA 5055-1)
  • 184263 Debian Security Update for util-linux (CVE-2021-3995)
  • 198660 Ubuntu Security Notification for util-linux Vulnerabilities (USN-5279-1)
  • 282338 Fedora Security Update for util (FEDORA-2022-9d02441b24)
  • 354315 Amazon Linux Security Advisory for util-linux : ALAS2022-2022-086
  • 354387 Amazon Linux Security Advisory for util-linux : ALAS2022-2022-099
  • 354474 Amazon Linux Security Advisory for util-linux : ALAS2022-2022-218
  • 354581 Amazon Linux Security Advisory for util-linux : ALAS-2022-218
  • 355340 Amazon Linux Security Advisory for util-linux : ALAS2023-2023-024
  • 376419 Snap-Confine Local Privilege Escalation Vulnerability (Oh Snap! More Lemmings)
  • 500713 Alpine Linux Security Update for util-linux
  • 504487 Alpine Linux Security Update for util-linux
  • 6140054 AWS Bottlerocket Security Update for util-linux (GHSA-f6fp-9j83-vqxq)
  • 6140285 AWS Bottlerocket Security Update for util-linux (GHSA-8qx4-6xgm-wjhq)
  • 671444 EulerOS Security Update for util-linux (EulerOS-SA-2022-1461)
  • 671460 EulerOS Security Update for util-linux (EulerOS-SA-2022-1440)
  • 671640 EulerOS Security Update for util-linux (EulerOS-SA-2022-1654)
  • 671644 EulerOS Security Update for util-linux (EulerOS-SA-2022-1668)
  • 710828 Gentoo Linux util-linux Multiple Vulnerabilities (GLSA 202401-08)
  • 751814 OpenSUSE Security Update for libeconf, shadow and util-linux (openSUSE-SU-2022:0727-1)
  • 752028 SUSE Enterprise Linux Security Update for libeconf, shadow and util-linux (SUSE-SU-2022:0727-1)
  • 903742 Common Base Linux Mariner (CBL-Mariner) Security Update for util-linux (10709)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report