CVE-2021-4150

A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2025938 Issue Tracking Third Party Advisory
https://lkml.org/lkml/2021/10/18/485 Exploit Third Party Advisory
https://lkml.org/lkml/2021/9/6/781 Exploit Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2025938 Issue Tracking Third Party Advisory
https://lkml.org/lkml/2021/10/18/485 Exploit Third Party Advisory
https://lkml.org/lkml/2021/9/6/781 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*

History

21 Nov 2024, 06:37

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2025938 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2025938 - Issue Tracking, Third Party Advisory
References () https://lkml.org/lkml/2021/10/18/485 - Exploit, Third Party Advisory () https://lkml.org/lkml/2021/10/18/485 - Exploit, Third Party Advisory
References () https://lkml.org/lkml/2021/9/6/781 - Exploit, Third Party Advisory () https://lkml.org/lkml/2021/9/6/781 - Exploit, Third Party Advisory

22 Jun 2022, 15:55

Type Values Removed Values Added
CPE cpe:2.3:a:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:*:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*

30 Mar 2022, 20:02

Type Values Removed Values Added
References (MISC) https://lkml.org/lkml/2021/10/18/485 - (MISC) https://lkml.org/lkml/2021/10/18/485 - Exploit, Third Party Advisory
References (MISC) https://lkml.org/lkml/2021/9/6/781 - (MISC) https://lkml.org/lkml/2021/9/6/781 - Exploit, Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2025938 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2025938 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:*:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc6:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*
cpe:2.3:a:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.9
v3 : 5.5
CWE CWE-416

23 Mar 2022, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-23 20:15

Updated : 2024-11-21 06:37


NVD link : CVE-2021-4150

Mitre link : CVE-2021-4150

CVE.ORG link : CVE-2021-4150


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free