CVE-2021-3996
CVSS V2 None
CVSS V3 Medium 5.5
Description
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
Overview
- CVE ID
- CVE-2021-3996
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-08-23T20:15:08
- Last Modified Date
- 2023-01-26T20:38:54
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:* | 1 | OR | 2.34 | 2.37.3 |
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 5.5
- Base Severity
- MEDIUM
- Exploitability Score
- 1.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html | |
http://seclists.org/fulldisclosure/2022/Dec/4 | |
http://www.openwall.com/lists/oss-security/2022/11/30/2 | |
https://access.redhat.com/security/cve/CVE-2021-3996 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2024628 | Issue Tracking Patch Third Party Advisory |
https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb | Patch Third Party Advisory |
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes | Release Notes Vendor Advisory |
https://security.netapp.com/advisory/ntap-20221209-0002/ | |
https://www.openwall.com/lists/oss-security/2022/01/24/2 | Exploit Mailing List Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-3996 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-08-23 21:00:07 | Added to TrackCVE | |||
2022-12-06 14:34:45 | 2022-12-01T01:15:10 | CVE Modified Date | updated | |
2022-12-06 14:34:47 | References | updated | ||
2022-12-09 05:24:58 | 2022-12-09T05:15:11 | CVE Modified Date | updated | |
2022-12-09 05:25:00 | References | updated | ||
2022-12-09 18:21:04 | 2022-12-09T17:15:11 | CVE Modified Date | updated | |
2022-12-09 18:21:06 | References | updated | ||
2022-12-09 19:16:24 | 2022-12-09T19:15:12 | CVE Modified Date | updated | |
2022-12-09 19:16:26 | References | updated | ||
2023-01-26 22:15:56 | 2023-01-26T20:38:54 | CVE Modified Date | updated | |
2023-01-26 22:15:56 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |