A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.
[
{
"events": [
{
"introduced": "5.10"
},
{
"fixed": "5.10.71"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.14.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0-sp3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "15.0-sp4"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-4028.json"