var-202105-1451
Vulnerability from variot
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux® distribution that tries to keep it simple. These packages include redhat-release-virtualization-host. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. (BZ#2010171)
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:3801-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3801 Issue date: 2021-10-12 CVE Names: CVE-2021-3653 CVE-2021-3656 CVE-2021-22543 CVE-2021-37576 =====================================================================
- Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Bug Fix(es):
-
Kernel panic due to double fault with DLM reporting for socket error "sk_err=32/0" (BZ#1834878)
-
"MFW indication via attention" message getting logged frequently after every 5 minutes (BZ#1854544)
-
lpfc fails to discovery in pt2pt with "2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0" (BZ#1922479)
-
pcpu_get_vm_areas using most memory from VmallocUsed (BZ#1970618)
-
RHEL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout (BZ#1982702)
-
[Azure] RHEL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs (BZ#1984128)
-
[stable guest ABI]Hot add CPU after migration cause guest hang (BZ#1991856)
-
i40e driver crash at RIP: i40e_config_vf_promiscuous_mode+0x165 (BZ#1993850)
-
[nfs] Performance issue since commit 5a4f6f11951e (BZ#1995649)
-
[kernel] Indefinite waiting for RCU callback while removing cgroup (BZ#2000973)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: kernel-3.10.0-1160.45.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.45.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm perf-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: kernel-3.10.0-1160.45.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.45.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm perf-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: kernel-3.10.0-1160.45.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm
ppc64: bpftool-3.10.0-1160.45.1.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-3.10.0-1160.45.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debug-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.45.1.el7.ppc64.rpm kernel-devel-3.10.0-1160.45.1.el7.ppc64.rpm kernel-headers-3.10.0-1160.45.1.el7.ppc64.rpm kernel-tools-3.10.0-1160.45.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.ppc64.rpm perf-3.10.0-1160.45.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm python-perf-3.10.0-1160.45.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm
ppc64le: bpftool-3.10.0-1160.45.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debug-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-devel-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-headers-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-tools-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.ppc64le.rpm perf-3.10.0-1160.45.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm python-perf-3.10.0-1160.45.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm
s390x: bpftool-3.10.0-1160.45.1.el7.s390x.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm kernel-3.10.0-1160.45.1.el7.s390x.rpm kernel-debug-3.10.0-1160.45.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.s390x.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1160.45.1.el7.s390x.rpm kernel-devel-3.10.0-1160.45.1.el7.s390x.rpm kernel-headers-3.10.0-1160.45.1.el7.s390x.rpm kernel-kdump-3.10.0-1160.45.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-1160.45.1.el7.s390x.rpm perf-3.10.0-1160.45.1.el7.s390x.rpm perf-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm python-perf-3.10.0-1160.45.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm
x86_64: bpftool-3.10.0-1160.45.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm perf-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
ppc64: bpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.45.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm
ppc64le: bpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm
x86_64: bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: kernel-3.10.0-1160.45.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-1160.45.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm perf-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
x86_64: bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2021-3653 https://access.redhat.com/security/cve/CVE-2021-3656 https://access.redhat.com/security/cve/CVE-2021-22543 https://access.redhat.com/security/cve/CVE-2021-37576 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYWWqidzjgjWX9erEAQj5JA/+JDZu/xue2Mu3vd1Wr2SQNgVoy/tCYPKo z+zlQw1Eld1YcKgBrfF1b83yei3rp5foRyXsxl0wkcCvao3u8b/nTzX3ya3PxE6O yYV9VP4Nx8mmYsU6bw1yPAW7YLG4wS56Ff4kvZ+0EYKa14c6sZZ2qme98wBmfXm7 8/fvt+QlOVFSwcgqs9ME9vE/Ai/InXSnt5RDBNh9mxN8g44YqnsRwsUXrHAvCD7G RMMym2NJMYCHYs6rBBisK7LDD/pvS2xMZXAR57qy4sQhR0VyJpnLYd/FkrZjNdnr XpHLjrBHknunhoSmwf1fF4NYHfB0qQKUTi9drDUZLNKyI2vMrBYDQdSVVI78Kihh OBa0JdAYMeafduUQvHmTQihzYR/nGXykl0Eah4IpLlVXn6uQmjfsygqXZK3kLEv8 K4FOSiT7TKVq1gICE3D0c1UMAiRSAK25NjxLCKHpfKwKDWJV4kuHuVwa9Rx9TDVp P7mCmo6mVjqccRghcksV0L+y1rDdR4L+tBrJc1JfCHzaZtH7SV7jDNlW7FiPgnw4 5kDnWJk6IFgNUedydi2ODr/VPXIY+LCLWFTDY7RuQnNzgzGAn8bSfiVj7ddVKjxm d/EuZhWJxdkfd6V37Qa44wbv+EskoRbHdvZm6C+pjDBIe5ficos5TDkubKsEZxk5 dWp5Jpx6Lbw= =IUMH -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bugs fixed (https://bugzilla.redhat.com/):
1959721 - CVE-2019-20149 nodejs-kind-of: ctorName in index.js allows external user input to overwrite certain internal attributes 1991623 - RHACM 2.3.2 images
-
8.1) - aarch64, noarch, ppc64le, s390x, x86_64
-
Description:
Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.1/html/release_notes/
Security fixes:
-
redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
-
redis: Integer overflow issue with Streams (CVE-2021-32627)
-
redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
-
redis: Integer overflow issue with intsets (CVE-2021-32687)
-
redis: Integer overflow issue with strings (CVE-2021-41099)
-
redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
-
redis: Out of bounds read in lua debugger protocol parser (CVE-2021-32672)
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Container updates:
-
RHACM 2.1.12 images (BZ# 2007489)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. To apply this upgrade, you must upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/):
2007489 - RHACM 2.1.12 images 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request 2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings
- ========================================================================== Ubuntu Security Notice USN-5070-1 September 08, 2021
linux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11, linux-gcp, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11, linux-raspi vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel. An attacker in a guest VM could use this to read or write portions of the host's physical memory. (CVE-2021-3656)
Maxim Levitsky discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not properly prevent a guest VM from enabling AVIC in nested guest VMs. An attacker in a guest VM could use this to write to portions of the host's physical memory. (CVE-2021-3653)
It was discovered that the Linux kernel did not properly enforce certain types of entries in the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. An attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2020-26541)
It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. An attacker who could start and control a VM could possibly use this to expose sensitive information or execute arbitrary code. (CVE-2021-22543)
Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693)
Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612)
It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly compute the access permissions for shadow pages in some situations. A local attacker could use this to cause a denial of service. (CVE-2021-38198)
It was discovered that the perf subsystem in the Linux kernel for the PowerPC architecture contained a null pointer dereference in some situations. An attacker could use this to cause a denial of service (system crash). (CVE-2021-38200)
Ben Greear discovered that the mac80211 subsystem in the Linux kernel contained a null pointer dereference in some situations. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-38206)
It was discovered that the Xilinx LL TEMAC device driver in the Linux kernel did not properly calculate the number of buffers to be used in certain situations. A remote attacker could use this to cause a denial of service (system crash). (CVE-2021-38207)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: linux-image-5.11.0-1015-azure 5.11.0-1015.16 linux-image-5.11.0-1015-kvm 5.11.0-1015.16 linux-image-5.11.0-1017-aws 5.11.0-1017.18 linux-image-5.11.0-1017-oracle 5.11.0-1017.18 linux-image-5.11.0-1017-raspi 5.11.0-1017.18 linux-image-5.11.0-1017-raspi-nolpae 5.11.0-1017.18 linux-image-5.11.0-1018-gcp 5.11.0-1018.20 linux-image-5.11.0-34-generic 5.11.0-34.36 linux-image-5.11.0-34-generic-64k 5.11.0-34.36 linux-image-5.11.0-34-generic-lpae 5.11.0-34.36 linux-image-5.11.0-34-lowlatency 5.11.0-34.36 linux-image-aws 5.11.0.1017.18 linux-image-azure 5.11.0.1015.16 linux-image-gcp 5.11.0.1018.18 linux-image-generic 5.11.0.34.36 linux-image-generic-64k 5.11.0.34.36 linux-image-generic-lpae 5.11.0.34.36 linux-image-gke 5.11.0.1018.18 linux-image-kvm 5.11.0.1015.16 linux-image-lowlatency 5.11.0.34.36 linux-image-oem-20.04 5.11.0.34.36 linux-image-oracle 5.11.0.1017.18 linux-image-raspi 5.11.0.1017.15 linux-image-raspi-nolpae 5.11.0.1017.15 linux-image-virtual 5.11.0.34.36
Ubuntu 20.04 LTS: linux-image-5.11.0-1015-azure 5.11.0-1015.16~20.04.1 linux-image-5.11.0-1017-aws 5.11.0-1017.18~20.04.1 linux-image-5.11.0-1017-oracle 5.11.0-1017.18~20.04.1 linux-image-5.11.0-34-generic 5.11.0-34.36~20.04.1 linux-image-5.11.0-34-generic-64k 5.11.0-34.36~20.04.1 linux-image-5.11.0-34-generic-lpae 5.11.0-34.36~20.04.1 linux-image-5.11.0-34-lowlatency 5.11.0-34.36~20.04.1 linux-image-aws 5.11.0.1017.18~20.04.16 linux-image-generic-64k-hwe-20.04 5.11.0.34.36~20.04.13 linux-image-generic-hwe-20.04 5.11.0.34.36~20.04.13 linux-image-generic-lpae-hwe-20.04 5.11.0.34.36~20.04.13 linux-image-lowlatency-hwe-20.04 5.11.0.34.36~20.04.13 linux-image-oracle 5.11.0.1017.18~20.04.10 linux-image-virtual-hwe-20.04 5.11.0.34.36~20.04.13
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
Bug Fix(es):
- [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975161)
4
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202105-1451", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "h300s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h410s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "34" }, { "model": "solidfire baseboard management controller", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h410c", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h500e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "h700s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2021-05-18" }, { "model": "h300e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "cloud backup", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h700e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h500s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22543" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "164565" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "164487" }, { "db": "PACKETSTORM", "id": "164076" }, { "db": "PACKETSTORM", "id": "163865" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164412" } ], "trust": 0.7 }, "cve": "CVE-2021-22543", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22543", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380980", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2021-22543", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-22543", "trust": 1.0, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380980", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22543", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux\u00ae distribution that tries to keep it simple. \nThese packages include redhat-release-virtualization-host. \nRHVH features a Cockpit user interface for monitoring the host\u0027s resources\nand\nperforming administrative tasks. (BZ#2010171)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2021:3801-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:3801\nIssue date: 2021-10-12\nCVE Names: CVE-2021-3653 CVE-2021-3656 CVE-2021-22543 \n CVE-2021-37576 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nBug Fix(es):\n\n* Kernel panic due to double fault with DLM reporting for socket error\n\"sk_err=32/0\" (BZ#1834878)\n\n* \"MFW indication via attention\" message getting logged frequently after\nevery 5 minutes (BZ#1854544)\n\n* lpfc fails to discovery in pt2pt with \"2754 PRLI failure DID:0000EF\nStatus:x9/x91e00, data: x0\" (BZ#1922479)\n\n* pcpu_get_vm_areas using most memory from VmallocUsed (BZ#1970618)\n\n* RHEL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and\nreleasing command after timeout (BZ#1982702)\n\n* [Azure] RHEL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs\n(BZ#1984128)\n\n* [stable guest ABI]Hot add CPU after migration cause guest hang\n(BZ#1991856)\n\n* i40e driver crash at RIP: i40e_config_vf_promiscuous_mode+0x165\n(BZ#1993850)\n\n* [nfs] Performance issue since commit 5a4f6f11951e (BZ#1995649)\n\n* [kernel] Indefinite waiting for RCU callback while removing cgroup\n(BZ#2000973)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-1160.45.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.45.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.45.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-1160.45.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.45.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.45.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-1160.45.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.45.1.el7.noarch.rpm\n\nppc64:\nbpftool-3.10.0-1160.45.1.el7.ppc64.rpm\nbpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debug-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-devel-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-headers-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-tools-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-1160.45.1.el7.ppc64.rpm\nperf-3.10.0-1160.45.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\npython-perf-3.10.0-1160.45.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-3.10.0-1160.45.1.el7.ppc64le.rpm\nbpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-1160.45.1.el7.ppc64le.rpm\nperf-3.10.0-1160.45.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\npython-perf-3.10.0-1160.45.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\n\ns390x:\nbpftool-3.10.0-1160.45.1.el7.s390x.rpm\nbpftool-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-debug-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-devel-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-headers-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-kdump-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-1160.45.1.el7.s390x.rpm\nperf-3.10.0-1160.45.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm\npython-perf-3.10.0-1160.45.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-1160.45.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nbpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-1160.45.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-1160.45.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-1160.45.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.45.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.45.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-3653\nhttps://access.redhat.com/security/cve/CVE-2021-3656\nhttps://access.redhat.com/security/cve/CVE-2021-22543\nhttps://access.redhat.com/security/cve/CVE-2021-37576\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\ndWp5Jpx6Lbw=\n=IUMH\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Bugs fixed (https://bugzilla.redhat.com/):\n\n1959721 - CVE-2019-20149 nodejs-kind-of: ctorName in index.js allows external user input to overwrite certain internal attributes\n1991623 - RHACM 2.3.2 images\n\n5. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.1.12 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in. See the following Release Notes\ndocumentation, which will be updated shortly for this release, for\nadditional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.1/html/release_notes/\n\nSecurity fixes:\n\n* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)\n\n* redis: Integer overflow issue with Streams (CVE-2021-32627)\n\n* redis: Integer overflow bug in the ziplist data structure\n(CVE-2021-32628)\n\n* redis: Integer overflow issue with intsets (CVE-2021-32687)\n\n* redis: Integer overflow issue with strings (CVE-2021-41099)\n\n* redis: Denial of service via Redis Standard Protocol (RESP) request\n(CVE-2021-32675)\n\n* redis: Out of bounds read in lua debugger protocol parser\n(CVE-2021-32672)\n\nFor more details about the security issues, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nContainer updates:\n\n* RHACM 2.1.12 images (BZ# 2007489)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. To apply this upgrade,\nyou \nmust upgrade your OpenShift Container Platform version to 4.6, or later. Bugs fixed (https://bugzilla.redhat.com/):\n\n2007489 - RHACM 2.1.12 images\n2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets\n2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request\n2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser\n2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure\n2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams\n2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack\n2011020 - CVE-2021-41099 redis: Integer overflow issue with strings\n\n5. ==========================================================================\nUbuntu Security Notice USN-5070-1\nSeptember 08, 2021\n\nlinux, linux-aws, linux-aws-5.11, linux-azure, linux-azure-5.11,\nlinux-gcp, linux-hwe-5.11, linux-kvm, linux-oracle, linux-oracle-5.11,\nlinux-raspi vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.04\n- Ubuntu 20.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. An attacker in a\nguest VM could use this to read or write portions of the host\u0027s physical\nmemory. (CVE-2021-3656)\n\nMaxim Levitsky discovered that the KVM hypervisor implementation for AMD\nprocessors in the Linux kernel did not properly prevent a guest VM from\nenabling AVIC in nested guest VMs. An attacker in a guest VM could use this\nto write to portions of the host\u0027s physical memory. (CVE-2021-3653)\n\nIt was discovered that the Linux kernel did not properly enforce certain\ntypes of entries in the Secure Boot Forbidden Signature Database (aka dbx)\nprotection mechanism. An attacker could use this to bypass UEFI Secure Boot\nrestrictions. (CVE-2020-26541)\n\nIt was discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly perform reference counting in some situations,\nleading to a use-after-free vulnerability. An attacker who could start and\ncontrol a VM could possibly use this to expose sensitive information or\nexecute arbitrary code. (CVE-2021-22543)\n\nNorbert Slusarek discovered that the CAN broadcast manger (bcm) protocol\nimplementation in the Linux kernel did not properly initialize memory in\nsome situations. A local attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2021-34693)\n\nMurray McAllister discovered that the joystick device interface in the\nLinux kernel did not properly validate data passed via an ioctl(). A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code on systems with a joystick device\nregistered. (CVE-2021-3612)\n\nIt was discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly compute the access permissions for shadow pages in\nsome situations. A local attacker could use this to cause a denial of\nservice. (CVE-2021-38198)\n\nIt was discovered that the perf subsystem in the Linux kernel for the\nPowerPC architecture contained a null pointer dereference in some\nsituations. An attacker could use this to cause a denial of service (system\ncrash). (CVE-2021-38200)\n\nBen Greear discovered that the mac80211 subsystem in the Linux kernel\ncontained a null pointer dereference in some situations. A physically\nproximate attacker could possibly use this to cause a denial of service\n(system crash). (CVE-2021-38206)\n\nIt was discovered that the Xilinx LL TEMAC device driver in the Linux\nkernel did not properly calculate the number of buffers to be used in\ncertain situations. A remote attacker could use this to cause a denial of\nservice (system crash). (CVE-2021-38207)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.04:\n linux-image-5.11.0-1015-azure 5.11.0-1015.16\n linux-image-5.11.0-1015-kvm 5.11.0-1015.16\n linux-image-5.11.0-1017-aws 5.11.0-1017.18\n linux-image-5.11.0-1017-oracle 5.11.0-1017.18\n linux-image-5.11.0-1017-raspi 5.11.0-1017.18\n linux-image-5.11.0-1017-raspi-nolpae 5.11.0-1017.18\n linux-image-5.11.0-1018-gcp 5.11.0-1018.20\n linux-image-5.11.0-34-generic 5.11.0-34.36\n linux-image-5.11.0-34-generic-64k 5.11.0-34.36\n linux-image-5.11.0-34-generic-lpae 5.11.0-34.36\n linux-image-5.11.0-34-lowlatency 5.11.0-34.36\n linux-image-aws 5.11.0.1017.18\n linux-image-azure 5.11.0.1015.16\n linux-image-gcp 5.11.0.1018.18\n linux-image-generic 5.11.0.34.36\n linux-image-generic-64k 5.11.0.34.36\n linux-image-generic-lpae 5.11.0.34.36\n linux-image-gke 5.11.0.1018.18\n linux-image-kvm 5.11.0.1015.16\n linux-image-lowlatency 5.11.0.34.36\n linux-image-oem-20.04 5.11.0.34.36\n linux-image-oracle 5.11.0.1017.18\n linux-image-raspi 5.11.0.1017.15\n linux-image-raspi-nolpae 5.11.0.1017.15\n linux-image-virtual 5.11.0.34.36\n\nUbuntu 20.04 LTS:\n linux-image-5.11.0-1015-azure 5.11.0-1015.16~20.04.1\n linux-image-5.11.0-1017-aws 5.11.0-1017.18~20.04.1\n linux-image-5.11.0-1017-oracle 5.11.0-1017.18~20.04.1\n linux-image-5.11.0-34-generic 5.11.0-34.36~20.04.1\n linux-image-5.11.0-34-generic-64k 5.11.0-34.36~20.04.1\n linux-image-5.11.0-34-generic-lpae 5.11.0-34.36~20.04.1\n linux-image-5.11.0-34-lowlatency 5.11.0-34.36~20.04.1\n linux-image-aws 5.11.0.1017.18~20.04.16\n linux-image-generic-64k-hwe-20.04 5.11.0.34.36~20.04.13\n linux-image-generic-hwe-20.04 5.11.0.34.36~20.04.13\n linux-image-generic-lpae-hwe-20.04 5.11.0.34.36~20.04.13\n linux-image-lowlatency-hwe-20.04 5.11.0.34.36~20.04.13\n linux-image-oracle 5.11.0.1017.18~20.04.10\n linux-image-virtual-hwe-20.04 5.11.0.34.36~20.04.13\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nBug Fix(es):\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap\n[7.9.z] (BZ#1975161)\n\n4", "sources": [ { "db": "NVD", "id": "CVE-2021-22543" }, { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164565" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "164487" }, { "db": "PACKETSTORM", "id": "164099" }, { "db": "PACKETSTORM", "id": "164076" }, { "db": "PACKETSTORM", "id": "163865" }, { "db": "PACKETSTORM", "id": "164589" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164098" }, { "db": "PACKETSTORM", "id": "164412" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22543", "trust": 2.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/06/26/1", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "164589", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "164583", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "164666", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164652", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "167858", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-380980", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22543", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164565", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164562", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164487", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164099", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164076", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163865", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164098", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164412", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164565" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "164487" }, { "db": "PACKETSTORM", "id": "164099" }, { "db": "PACKETSTORM", "id": "164076" }, { "db": "PACKETSTORM", "id": "163865" }, { "db": "PACKETSTORM", "id": "164589" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164098" }, { "db": "PACKETSTORM", "id": "164412" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "id": "VAR-202105-1451", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380980" } ], "trust": 0.01 }, "last_update_date": "2024-09-19T20:27:40.057000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20225640 - Security Advisory" }, { "title": "Red Hat: CVE-2021-22543", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-22543" }, { "title": "Amazon Linux 2: ALAS2-2021-1699", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1699" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-22543 log" }, { "title": "Amazon Linux AMI: ALAS-2021-1539", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2021-1539" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-004", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-004" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.10-2022-002", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.10-2022-002" }, { "title": "CVE-2021-22543", "trust": 0.1, "url": "https://github.com/JamesGeeee/CVE-2021-22543 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20210708-0002/" }, { "trust": 1.2, "url": "https://github.com/google/security-research/security/advisories/ghsa-7wq5-phmq-m584" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" }, { "trust": 1.2, "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22543" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4g5ybuvephzyxmkngbz3s6infcteel4e/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/roqixqb7zawi3ksgshr6h5rduwzi775s/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2021-22543" }, { "trust": 0.7, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.7, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.7, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3653" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3656" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37576" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2021-37576" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3656" }, { "trust": 0.3, "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3653" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3612" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-32399" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22555" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-22555" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/roqixqb7zawi3ksgshr6h5rduwzi775s/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4g5ybuvephzyxmkngbz3s6infcteel4e/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22922" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36222" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-32626" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-32687" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-37750" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32626" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41099" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-23840" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22923" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32675" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22924" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37750" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22922" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4658" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22924" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-32675" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-4658" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-41099" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32627" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32687" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32628" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32672" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36222" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23841" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-32627" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-32672" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22923" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-23841" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23840" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-32628" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36311" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38207" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26541" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:5640" }, { "trust": 0.1, "url": "https://github.com/jamesgeeee/cve-2021-22543" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3943" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25741" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23017" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21671" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3925" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32690" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21671" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32690" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23017" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25741" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3801" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1052.55" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1058.60" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1023.24" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1052.55~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1054.58~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1023.24~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1054.58" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1046.48" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1056.59~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1052.56" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1058.60~18.04.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5071-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.4.0-84.94" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1056.59" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1052.56~18.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27218" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20149" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33197" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3609" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-27777" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29154" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31535" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3609" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33195" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29650" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33198" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33198" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-34558" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27218" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27777" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29154" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33197" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2019-20149" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3454" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-29650" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31535" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-34558" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3173" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19449" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3759" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38199" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40490" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.8/5.8.0-1043.46~20.04.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5120-1" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3949" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe-5.11/5.11.0-34.36~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.11.0-1015.16" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.11/5.11.0-1015.16~20.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38198" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.11.0-34.36" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38200" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-34693" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.11.0-1018.20" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.11.0-1017.18" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.11.0-1017.18" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5070-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.11/5.11.0-1017.18~20.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38206" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-5.11/5.11.0-1017.18~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.11.0-1017.18" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1015.16" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3725" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164565" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "164487" }, { "db": "PACKETSTORM", "id": "164099" }, { "db": "PACKETSTORM", "id": "164076" }, { "db": "PACKETSTORM", "id": "163865" }, { "db": "PACKETSTORM", "id": "164589" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164098" }, { "db": "PACKETSTORM", "id": "164412" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164565" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "164487" }, { "db": "PACKETSTORM", "id": "164099" }, { "db": "PACKETSTORM", "id": "164076" }, { "db": "PACKETSTORM", "id": "163865" }, { "db": "PACKETSTORM", "id": "164589" }, { "db": "PACKETSTORM", "id": "164583" }, { "db": "PACKETSTORM", "id": "164098" }, { "db": "PACKETSTORM", "id": "164412" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-05-26T00:00:00", "db": "VULHUB", "id": "VHN-380980" }, { "date": "2021-05-26T00:00:00", "db": "VULMON", "id": "CVE-2021-22543" }, { "date": "2021-10-20T15:47:57", "db": "PACKETSTORM", "id": "164565" }, { "date": "2021-10-20T15:45:47", "db": "PACKETSTORM", "id": "164562" }, { "date": "2021-10-13T14:46:02", "db": "PACKETSTORM", "id": "164487" }, { "date": "2021-09-09T14:22:22", "db": "PACKETSTORM", "id": "164099" }, { "date": "2021-09-08T14:26:43", "db": "PACKETSTORM", "id": "164076" }, { "date": "2021-08-17T15:21:44", "db": "PACKETSTORM", "id": "163865" }, { "date": "2021-10-22T15:27:48", "db": "PACKETSTORM", "id": "164589" }, { "date": "2021-10-21T15:31:47", "db": "PACKETSTORM", "id": "164583" }, { "date": "2021-09-09T18:22:22", "db": "PACKETSTORM", "id": "164098" }, { "date": "2021-10-05T15:00:09", "db": "PACKETSTORM", "id": "164412" }, { "date": "2021-05-26T11:15:08.623000", "db": "NVD", "id": "CVE-2021-22543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-380980" }, { "date": "2022-04-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22543" }, { "date": "2024-05-29T20:15:09.870000", "db": "NVD", "id": "CVE-2021-22543" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat Security Advisory 2021-3943-01", "sources": [ { "db": "PACKETSTORM", "id": "164565" } ], "trust": 0.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bypass", "sources": [ { "db": "PACKETSTORM", "id": "164565" }, { "db": "PACKETSTORM", "id": "164487" } ], "trust": 0.2 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.