CVE-2021-3995
CVSS V2 None
CVSS V3 Medium 5.5
Description
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
Overview
- CVE ID
- CVE-2021-3995
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-08-23T20:15:08
- Last Modified Date
- 2023-02-03T23:30:56
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:* | 1 | OR | 2.34 | 2.37.3 |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 5.5
- Base Severity
- MEDIUM
- Exploitability Score
- 1.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html | |
http://seclists.org/fulldisclosure/2022/Dec/4 | |
http://www.openwall.com/lists/oss-security/2022/11/30/2 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2024631https://access.redhat.com/security/cve/CVE-2021-3995 | Broken Link Issue Tracking |
https://github.com/util-linux/util-linux/commit/57202f5713afa2af20ffbb6ab5331481d0396f8d | Patch Third Party Advisory |
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes | Release Notes Vendor Advisory |
https://security.netapp.com/advisory/ntap-20221209-0002/ | |
https://www.openwall.com/lists/oss-security/2022/01/24/2 | Exploit Mailing List Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-3995 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-08-23 21:00:07 | Added to TrackCVE | |||
2022-12-06 14:34:43 | 2022-12-01T01:15:10 | CVE Modified Date | updated | |
2022-12-06 14:34:43 | Analyzed | Undergoing Analysis | Vulnerability Status | updated |
2022-12-06 14:34:45 | References | updated | ||
2022-12-07 17:14:31 | 2022-12-07T17:08:51 | CVE Modified Date | updated | |
2022-12-07 17:14:31 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2022-12-09 05:24:56 | 2022-12-09T05:15:11 | CVE Modified Date | updated | |
2022-12-09 05:24:56 | Analyzed | Modified | Vulnerability Status | updated |
2022-12-09 05:24:58 | References | updated | ||
2022-12-09 18:21:02 | 2022-12-09T17:15:11 | CVE Modified Date | updated | |
2022-12-09 18:21:04 | References | updated | ||
2022-12-09 19:16:22 | 2022-12-09T19:15:12 | CVE Modified Date | updated | |
2022-12-09 19:16:24 | References | updated | ||
2022-12-10 05:33:28 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-02-04 00:14:17 | 2023-02-03T23:30:56 | CVE Modified Date | updated | |
2023-02-04 00:14:17 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |