CVE-2021-4202
Summary
| CVE | CVE-2021-4202 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-03-25 19:15:00 UTC |
| Updated | 2023-11-07 03:40:00 UTC |
| Description | A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem. |
Risk And Classification
Problem Types: CWE-362 | CWE-416
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Linux | Linux Kernel | 5.16 | - | All | All |
| Operating System | Linux | Linux Kernel | 5.16 | rc1 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - Re: CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability | MLIST | www.openwall.com | |
| oss-security - Re: CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability | MLIST | www.openwall.com | |
| 2036682 – (CVE-2021-4202) CVE-2021-4202 kernel: Race condition in nci_request() leads to use after free while the device is getting removed | MISC | bugzilla.redhat.com | |
| oss-security - Re: CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability | MLIST | www.openwall.com | |
| kernel/git/stable/linux.git - Linux kernel stable tree | MISC | git.kernel.org | |
| kernel/git/stable/linux.git - Linux kernel stable tree | MISC | git.kernel.org | |
| kernel/git/stable/linux.git - Linux kernel stable tree | MISC | git.kernel.org | |
| CVE-2021-4202 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 179117 Debian Security Update for linux (DSA 5096-1)
- 179118 Debian Security Update for linux (DLA 2940-1)
- 179119 Debian Security Update for linux-4.19 (DLA 2941-1)
- 179747 Debian Security Update for linux (CVE-2021-4202)
- 198653 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5265-1)
- 198667 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5294-1)
- 198674 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5294-2)
- 198676 Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5297-1)
- 198678 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5298-1)
- 353242 Amazon Linux Security Advisory for kernel : ALAC2012-2022-036
- 353243 Amazon Linux Security Advisory for kmod-mlx5 : ALAC2012-2022-037
- 353244 Amazon Linux Security Advisory for kmod-sfc : ALAC2012-2022-038
- 377053 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2022:0028)
- 751654 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0197-1)
- 751657 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0198-1)
- 751666 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0169-1)
- 751695 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0367-1)
- 751696 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0364-1)
- 751697 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0366-1)
- 751698 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0362-1)
- 751701 OpenSUSE Security Update for the Linux Kernel (openSUSE-SU-2022:0366-1)
- 751702 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0371-1)
- 751703 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0372-1)
- 751757 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 41 for SLE 12 SP3) (SUSE-SU-2022:0552-1)
- 751993 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0198-1)
- 753191 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 6 for SLE 15 SP3) (SUSE-SU-2022:0463-1)
- 753194 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0288-1)
- 753267 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0169-1)
- 753410 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 26 for SLE 12 SP5) (SUSE-SU-2022:0418-1)
- 753462 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2022:0289-1)
- 900804 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9265)
- 901315 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9265-1)
- 901707 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9237)
- 902066 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9237-1)
- 906040 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9265-2)
- 906498 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (9237-2)