NA

CVE-2021-3996

Published: 23/08/2022 Updated: 07/01/2024
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local malicious user to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. (CVE-2021-3995) A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. (CVE-2021-3996)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kernel util-linux

fedoraproject fedora 35

Vendor Advisories

The Qualys Research Labs discovered two vulnerabilities in util-linux's libmount These flaws allow an unprivileged user to unmount other users' filesystems that are either world-writable themselves or mounted in a world-writable directory (CVE-2021-3996), or to unmount FUSE filesystems that belong to certain other users (CVE-2021-3995) For the st ...
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form An attacker may use ...
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form An attacker may use ...
ALAS-2022-218 Amazon Linux 2022 Security Advisory: ALAS-2022-218 Advisory Release Date: 2022-12-06 16:41 Pacific ...

Exploits

Qualys discovered a race condition (CVE-2022-3328) in snap-confine, a SUID-root program installed by default on Ubuntu In this advisory,they tell the story of this vulnerability (which was introduced in February 2022 by the patch for CVE-2021-44731) and detail how they exploited it in Ubuntu Server (a local privilege escalation, from any user to r ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2021-44731: Race condition in snap-confine's setup_private_mount() <!--X-Subject-Header-End--> <!--X-Head-of-Message--> ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: CVE-2021-44731: Race condition in snap-confine's setup_private_mount() <!--X-Subject-Header-End--> <!--X-Head-of-Message-- ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2021-3996 and CVE-2021-3995 in util-linux's libmount <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Qualys S ...

Github Repositories

SRE Labs This repository contains: the source code to implement a standalone HTTP web application a dockerfile to containerize the service an helm chart for the service an helm chart to install kube-prometheus-stack with an easy example of dashboard and alert a script to automate the provisioning of a local Kubernetes cluster Requirements You should have installed at least: