Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-45du-dgkd-p3b8
Vulnerability ID VCID-45du-dgkd-p3b8
Aliases CVE-2021-4155
Summary kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL
Status Published
Exploitability 0.5
Weighted Severity 5.0
Risk 2.5
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
https://api.first.org/data/v1/epss?cve=CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2034813 https://bugzilla.redhat.com/show_bug.cgi?id=2034813
RHSA-2022:0176 https://access.redhat.com/errata/RHSA-2022:0176
RHSA-2022:0186 https://access.redhat.com/errata/RHSA-2022:0186
RHSA-2022:0187 https://access.redhat.com/errata/RHSA-2022:0187
RHSA-2022:0188 https://access.redhat.com/errata/RHSA-2022:0188
RHSA-2022:0231 https://access.redhat.com/errata/RHSA-2022:0231
RHSA-2022:0232 https://access.redhat.com/errata/RHSA-2022:0232
RHSA-2022:0335 https://access.redhat.com/errata/RHSA-2022:0335
RHSA-2022:0344 https://access.redhat.com/errata/RHSA-2022:0344
RHSA-2022:0529 https://access.redhat.com/errata/RHSA-2022:0529
RHSA-2022:0530 https://access.redhat.com/errata/RHSA-2022:0530
RHSA-2022:0531 https://access.redhat.com/errata/RHSA-2022:0531
RHSA-2022:0533 https://access.redhat.com/errata/RHSA-2022:0533
RHSA-2022:0540 https://access.redhat.com/errata/RHSA-2022:0540
RHSA-2022:0590 https://access.redhat.com/errata/RHSA-2022:0590
RHSA-2022:0592 https://access.redhat.com/errata/RHSA-2022:0592
RHSA-2022:0620 https://access.redhat.com/errata/RHSA-2022:0620
RHSA-2022:0622 https://access.redhat.com/errata/RHSA-2022:0622
RHSA-2022:0629 https://access.redhat.com/errata/RHSA-2022:0629
RHSA-2022:0636 https://access.redhat.com/errata/RHSA-2022:0636
RHSA-2022:0712 https://access.redhat.com/errata/RHSA-2022:0712
RHSA-2022:0718 https://access.redhat.com/errata/RHSA-2022:0718
RHSA-2022:0958 https://access.redhat.com/errata/RHSA-2022:0958
RHSA-2022:1263 https://access.redhat.com/errata/RHSA-2022:1263
RHSA-2022:1417 https://access.redhat.com/errata/RHSA-2022:1417
USN-5278-1 https://usn.ubuntu.com/5278-1/
USN-5294-1 https://usn.ubuntu.com/5294-1/
USN-5294-2 https://usn.ubuntu.com/5294-2/
USN-5295-1 https://usn.ubuntu.com/5295-1/
USN-5295-2 https://usn.ubuntu.com/5295-2/
USN-5297-1 https://usn.ubuntu.com/5297-1/
USN-5298-1 https://usn.ubuntu.com/5298-1/
USN-5362-1 https://usn.ubuntu.com/5362-1/
USN-5884-1 https://usn.ubuntu.com/5884-1/
USN-5926-1 https://usn.ubuntu.com/5926-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.05306
EPSS Score 0.0002
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T14:00:34.364527+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json 38.0.0