CVE-2021-4028
Summary
| CVE | CVE-2021-4028 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-24 16:15:00 UTC |
| Updated | 2023-02-10 16:18:00 UTC |
| Description | A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| LKML: Greg Kroah-Hartman: [PATCH 5.10 22/93] RDMA/cma: Do not change route.addr.src_addr.ss_family |
MISC |
lkml.org |
|
| CVE-2021-4028 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| kernel/git/torvalds/linux.git - Linux kernel source tree |
MISC |
git.kernel.org |
|
| Red Hat Customer Portal - Access to 24x7 support and knowledge |
MISC |
access.redhat.com |
|
| 2027201 – (CVE-2021-4028) CVE-2021-4028 kernel: use-after-free in RDMA listen() |
MISC |
bugzilla.redhat.com |
|
| Bug 1193167 – VUL-0: CVE-2021-4028: kernel-source,kernel-source-rt,kernel-source-azure: kernel: use-after-free in RDMA listen() |
MISC |
bugzilla.suse.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159740 Oracle Enterprise Linux Security Update for kernel (ELSA-2022-1198)
- 159766 Oracle Enterprise Linux Security Update for kernel (ELSA-2022-1550)
- 180126 Debian Security Update for linux (CVE-2021-4028)
- 240094 Red Hat Update for kpatch-patch (RHSA-2022:0590)
- 240100 Red Hat Update for kernel (RHSA-2022:0636)
- 240101 Red Hat Update for kernel-rt (RHSA-2022:0629)
- 240120 Red Hat Update for kpatch-patch (RHSA-2022:0772)
- 240121 Red Hat Update for kernel-rt (RHSA-2022:0771)
- 240122 Red Hat Update for kernel security (RHSA-2022:0777)
- 240195 Red Hat Update for kpatch-patch (RHSA-2022:1185)
- 240199 Red Hat Update for kernel security (RHSA-2022:1198)
- 240200 Red Hat Update for kernel-rt (RHSA-2022:1199)
- 240237 Red Hat Update for kpatch-patch (RHSA-2022:1535)
- 240243 Red Hat Update for kernel-rt (RHSA-2022:1555)
- 240249 Red Hat Update for kernel (RHSA-2022:1550)
- 240418 Red Hat Update for kpatch-patch (RHSA-2022:0851)
- 240440 Red Hat Update for kernel (RHSA-2022:1324)
- 753118 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 3 for SLE 15 SP3) (SUSE-SU-2022:0295-1)
- 753292 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 0 for SLE 15 SP3) (SUSE-SU-2022:0293-1)
- 753385 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 4 for SLE 15 SP3) (SUSE-SU-2022:0257-1)
- 753423 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 7 for SLE 15 SP3) (SUSE-SU-2022:0270-1)
- 940484 AlmaLinux Security Update for kernel (ALSA-2022:1550)