Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-u4gb-1hyn-m7g4
Vulnerability ID VCID-u4gb-1hyn-m7g4
Aliases CVE-2021-4083
Summary kernel: fget: check that the fd still exists after getting a ref to it
Status Published
Exploitability 0.5
Weighted Severity 6.7
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://api.first.org/data/v1/epss?cve=CVE-2021-4083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2029923 https://bugzilla.redhat.com/show_bug.cgi?id=2029923
RHSA-2022:0820 https://access.redhat.com/errata/RHSA-2022:0820
RHSA-2022:0821 https://access.redhat.com/errata/RHSA-2022:0821
RHSA-2022:0823 https://access.redhat.com/errata/RHSA-2022:0823
RHSA-2022:0851 https://access.redhat.com/errata/RHSA-2022:0851
RHSA-2022:0925 https://access.redhat.com/errata/RHSA-2022:0925
RHSA-2022:0958 https://access.redhat.com/errata/RHSA-2022:0958
RHSA-2022:1103 https://access.redhat.com/errata/RHSA-2022:1103
RHSA-2022:1104 https://access.redhat.com/errata/RHSA-2022:1104
RHSA-2022:1107 https://access.redhat.com/errata/RHSA-2022:1107
RHSA-2022:1185 https://access.redhat.com/errata/RHSA-2022:1185
RHSA-2022:1198 https://access.redhat.com/errata/RHSA-2022:1198
RHSA-2022:1199 https://access.redhat.com/errata/RHSA-2022:1199
RHSA-2022:1263 https://access.redhat.com/errata/RHSA-2022:1263
RHSA-2022:1324 https://access.redhat.com/errata/RHSA-2022:1324
RHSA-2022:1373 https://access.redhat.com/errata/RHSA-2022:1373
RHSA-2022:1413 https://access.redhat.com/errata/RHSA-2022:1413
RHSA-2022:1418 https://access.redhat.com/errata/RHSA-2022:1418
RHSA-2022:1455 https://access.redhat.com/errata/RHSA-2022:1455
RHSA-2022:1975 https://access.redhat.com/errata/RHSA-2022:1975
RHSA-2022:1988 https://access.redhat.com/errata/RHSA-2022:1988
RHSA-2022:2189 https://access.redhat.com/errata/RHSA-2022:2189
RHSA-2022:4896 https://access.redhat.com/errata/RHSA-2022:4896
USN-5278-1 https://usn.ubuntu.com/5278-1/
USN-5294-1 https://usn.ubuntu.com/5294-1/
USN-5294-2 https://usn.ubuntu.com/5294-2/
USN-5295-1 https://usn.ubuntu.com/5295-1/
USN-5295-2 https://usn.ubuntu.com/5295-2/
USN-5297-1 https://usn.ubuntu.com/5297-1/
USN-5298-1 https://usn.ubuntu.com/5298-1/
USN-5361-1 https://usn.ubuntu.com/5361-1/
USN-5362-1 https://usn.ubuntu.com/5362-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.01551
EPSS Score 0.00012
Published At April 16, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T14:00:58.677598+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json 38.0.0