ID

VAR-202103-1029


CVE

CVE-2021-28038


TITLE

Xen PV  Used in  Linux Kernel   Vulnerability in resource allocation without restrictions or throttling in

Trust: 0.8

sources: JVNDB: JVNDB-2021-003871

DESCRIPTION

An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931. This update provides the corresponding Linux kernel updates targeted specifically for Raspberry Pi devices in those same Ubuntu Releases. ========================================================================== Ubuntu Security Notice USN-4984-1 June 04, 2021 linux, linux-aws, linux-azure, linux-gcp, linux-hwe-5.8, linux-kvm, linux-oracle vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. An attacker in a guest VM could possibly use this to cause a denial of service (host domain crash). (CVE-2021-28038) It was discovered that the Realtek RTL8188EU Wireless device driver in the Linux kernel did not properly validate ssid lengths in some situations. An attacker could use this to cause a denial of service (system crash). A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-28688) It was discovered that the fuse user space file system implementation in the Linux kernel did not properly handle bad inodes in some situations. A local attacker could possibly use this to cause a denial of service. (CVE-2021-28950) John Stultz discovered that the audio driver for Qualcomm SDM845 systems in the Linux kernel did not properly validate port ID numbers. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-28952) Zygo Blaxell discovered that the btrfs file system implementation in the Linux kernel contained a race condition during certain cloning operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-28964) Vince Weaver discovered that the perf subsystem in the Linux kernel did not properly handle certain PEBS records properly for some Intel Haswell processors. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-28971) It was discovered that the RPA PCI Hotplug driver implementation in the Linux kernel did not properly handle device name writes via sysfs, leading to a buffer overflow. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-28972) It was discovered that the Qualcomm IPC router implementation in the Linux kernel did not properly initialize memory passed to user space. A local attacker could use this to expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-30002) Dan Carpenter discovered that the block device manager (dm) implementation in the Linux kernel contained a buffer overflow in the ioctl for listing devices. A privileged local attacker could use this to cause a denial of service (system crash). (CVE-2021-31916) It was discovered that the CIPSO implementation in the Linux kernel did not properly perform reference counting in some situations, leading to use- after-free vulnerabilities. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33033) 马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3483) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: linux-image-5.8.0-1028-kvm 5.8.0-1028.30 linux-image-5.8.0-1031-oracle 5.8.0-1031.32 linux-image-5.8.0-1032-gcp 5.8.0-1032.34 linux-image-5.8.0-1033-azure 5.8.0-1033.35 linux-image-5.8.0-1035-aws 5.8.0-1035.37 linux-image-5.8.0-55-generic 5.8.0-55.62 linux-image-5.8.0-55-generic-64k 5.8.0-55.62 linux-image-5.8.0-55-generic-lpae 5.8.0-55.62 linux-image-5.8.0-55-lowlatency 5.8.0-55.62 linux-image-aws 5.8.0.1035.37 linux-image-azure 5.8.0.1033.33 linux-image-gcp 5.8.0.1032.32 linux-image-generic 5.8.0.55.60 linux-image-generic-64k 5.8.0.55.60 linux-image-generic-lpae 5.8.0.55.60 linux-image-gke 5.8.0.1032.32 linux-image-kvm 5.8.0.1028.30 linux-image-lowlatency 5.8.0.55.60 linux-image-oracle 5.8.0.1031.30 linux-image-virtual 5.8.0.55.60 Ubuntu 20.04 LTS: linux-image-5.8.0-55-generic 5.8.0-55.62~20.04.1 linux-image-5.8.0-55-generic-64k 5.8.0-55.62~20.04.1 linux-image-5.8.0-55-generic-lpae 5.8.0-55.62~20.04.1 linux-image-5.8.0-55-lowlatency 5.8.0-55.62~20.04.1 linux-image-generic-64k-hwe-20.04 5.8.0.55.62~20.04.39 linux-image-generic-hwe-20.04 5.8.0.55.62~20.04.39 linux-image-generic-lpae-hwe-20.04 5.8.0.55.62~20.04.39 linux-image-lowlatency-hwe-20.04 5.8.0.55.62~20.04.39 linux-image-virtual-hwe-20.04 5.8.0.55.62~20.04.39 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-4984-1 CVE-2021-28038, CVE-2021-28660, CVE-2021-28688, CVE-2021-28950, CVE-2021-28952, CVE-2021-28964, CVE-2021-28971, CVE-2021-28972, CVE-2021-29647, CVE-2021-30002, CVE-2021-31916, CVE-2021-33033, CVE-2021-3483 Package Information: https://launchpad.net/ubuntu/+source/linux/5.8.0-55.62 https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1035.37 https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1033.35 https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1032.34 https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1028.30 https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1031.32 https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-55.62~20.04.1 . (CVE-2017-16644) It was discovered that the timer stats implementation in the Linux kernel allowed the discovery of a real PID value while inside a PID namespace. (CVE-2021-20261) Olivier Benjamin, Norbert Manthey, Martin Mazein, and Jan H

Trust: 2.25

sources: NVD: CVE-2021-28038 // JVNDB: JVNDB-2021-003871 // VULHUB: VHN-387389 // PACKETSTORM: 162167 // PACKETSTORM: 162695 // PACKETSTORM: 162981 // PACKETSTORM: 162163 // PACKETSTORM: 162542 // PACKETSTORM: 162541

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:gteversion:4.10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.179

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.4.103

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.21

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.260

Trust: 1.0

vendor:linuxmodel:kernelscope:eqversion:5.12

Trust: 1.0

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.260

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.11.4

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.11.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5.0

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:2.6.39

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.224

Trust: 1.0

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

vendor:xen プロジェクトmodel:xenscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-003871 // NVD: CVE-2021-28038

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-28038
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-28038
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202103-474
value: MEDIUM

Trust: 0.6

VULHUB: VHN-387389
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-28038
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-387389
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:N/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-28038
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.0
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-28038
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-387389 // JVNDB: JVNDB-2021-003871 // CNNVD: CNNVD-202103-474 // NVD: CVE-2021-28038

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.1

problemtype:Allocation of resources without limits or throttling (CWE-770) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-387389 // JVNDB: JVNDB-2021-003871 // NVD: CVE-2021-28038

THREAT TYPE

local

Trust: 1.0

sources: PACKETSTORM: 162167 // PACKETSTORM: 162695 // PACKETSTORM: 162163 // PACKETSTORM: 162541 // CNNVD: CNNVD-202103-474

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202103-474

PATCH

title:Linux Kernel Archives Xen  project Xen Security Advisoryurl:https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html

Trust: 0.8

sources: JVNDB: JVNDB-2021-003871

EXTERNAL IDS

db:NVDid:CVE-2021-28038

Trust: 3.1

db:OPENWALLid:OSS-SECURITY/2021/03/05/1

Trust: 2.5

db:PACKETSTORMid:162163

Trust: 0.8

db:PACKETSTORMid:162981

Trust: 0.8

db:PACKETSTORMid:162695

Trust: 0.8

db:PACKETSTORMid:162541

Trust: 0.8

db:JVNDBid:JVNDB-2021-003871

Trust: 0.8

db:AUSCERTid:ESB-2021.2136

Trust: 0.6

db:AUSCERTid:ESB-2021.1089

Trust: 0.6

db:AUSCERTid:ESB-2021.1101

Trust: 0.6

db:AUSCERTid:ESB-2021.1624

Trust: 0.6

db:AUSCERTid:ESB-2021.1669

Trust: 0.6

db:AUSCERTid:ESB-2021.1307

Trust: 0.6

db:AUSCERTid:ESB-2021.1964

Trust: 0.6

db:AUSCERTid:ESB-2021.1694

Trust: 0.6

db:AUSCERTid:ESB-2021.1766

Trust: 0.6

db:AUSCERTid:ESB-2021.1228

Trust: 0.6

db:AUSCERTid:ESB-2021.1655

Trust: 0.6

db:AUSCERTid:ESB-2021.0837

Trust: 0.6

db:AUSCERTid:ESB-2021.1299

Trust: 0.6

db:CNNVDid:CNNVD-202103-474

Trust: 0.6

db:PACKETSTORMid:162167

Trust: 0.2

db:PACKETSTORMid:162542

Trust: 0.2

db:VULHUBid:VHN-387389

Trust: 0.1

sources: VULHUB: VHN-387389 // JVNDB: JVNDB-2021-003871 // PACKETSTORM: 162167 // PACKETSTORM: 162695 // PACKETSTORM: 162981 // PACKETSTORM: 162163 // PACKETSTORM: 162542 // PACKETSTORM: 162541 // CNNVD: CNNVD-202103-474 // NVD: CVE-2021-28038

REFERENCES

url:http://www.openwall.com/lists/oss-security/2021/03/05/1

Trust: 2.5

url:https://security.netapp.com/advisory/ntap-20210409-0001/

Trust: 1.7

url:http://xenbits.xen.org/xsa/advisory-367.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-28038

Trust: 1.4

url:https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2991397d23ec597405b116d96de3813420bdcbc3

Trust: 1.0

url:https://www.auscert.org.au/bulletins/esb-2021.0837

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1624

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1228

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1766

Trust: 0.6

url:https://packetstormsecurity.com/files/162981/ubuntu-security-notice-usn-4984-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1964

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1655

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1307

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1669

Trust: 0.6

url:https://packetstormsecurity.com/files/162695/ubuntu-security-notice-usn-4945-2.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2136

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1089

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1101

Trust: 0.6

url:https://packetstormsecurity.com/files/162163/ubuntu-security-notice-usn-4904-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1299

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1694

Trust: 0.6

url:https://packetstormsecurity.com/files/162541/ubuntu-security-notice-usn-4945-1.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-30002

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-28375

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-25639

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-29265

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-29650

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-28660

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-28950

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-4945-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-28688

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-26931

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-26930

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-4911-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1021.22

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1035.38

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1035.38~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4945-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1033.35

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28972

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28952

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4984-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.8.0-55.62

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1028.30

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1035.37

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28964

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1031.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1032.34

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33033

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-55.62~20.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29647

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28971

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5967

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1350

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4904-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1126.140

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1150.161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-16644

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19061

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1091.100

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1154.164

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-208.240

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13095

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-16232

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1085.90

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4946-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1099.112

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20292

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1102.109

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1102.111

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1071.79

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1018.22

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1114.127

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29264

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1091.93

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1047.49~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1043.45

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1047.49

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1043.46~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1015.16

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1015.16~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1044.47~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1043.46

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1048.50~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-73.82

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1039.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-73.82~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1045.49

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1043.45~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1048.50

Trust: 0.1

sources: VULHUB: VHN-387389 // JVNDB: JVNDB-2021-003871 // PACKETSTORM: 162167 // PACKETSTORM: 162695 // PACKETSTORM: 162981 // PACKETSTORM: 162163 // PACKETSTORM: 162542 // PACKETSTORM: 162541 // CNNVD: CNNVD-202103-474 // NVD: CVE-2021-28038

CREDITS

Ubuntu

Trust: 1.2

sources: PACKETSTORM: 162167 // PACKETSTORM: 162695 // PACKETSTORM: 162981 // PACKETSTORM: 162163 // PACKETSTORM: 162542 // PACKETSTORM: 162541 // CNNVD: CNNVD-202103-474

SOURCES

db:VULHUBid:VHN-387389
db:JVNDBid:JVNDB-2021-003871
db:PACKETSTORMid:162167
db:PACKETSTORMid:162695
db:PACKETSTORMid:162981
db:PACKETSTORMid:162163
db:PACKETSTORMid:162542
db:PACKETSTORMid:162541
db:CNNVDid:CNNVD-202103-474
db:NVDid:CVE-2021-28038

LAST UPDATE DATE

2024-08-14T12:15:30.781000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-387389date:2022-05-16T00:00:00
db:JVNDBid:JVNDB-2021-003871date:2021-11-09T05:47:00
db:CNNVDid:CNNVD-202103-474date:2021-06-17T00:00:00
db:NVDid:CVE-2021-28038date:2024-03-25T01:15:50.380

SOURCES RELEASE DATE

db:VULHUBid:VHN-387389date:2021-03-05T00:00:00
db:JVNDBid:JVNDB-2021-003871date:2021-11-09T00:00:00
db:PACKETSTORMid:162167date:2021-04-13T22:55:55
db:PACKETSTORMid:162695date:2021-05-19T14:19:27
db:PACKETSTORMid:162981date:2021-06-04T22:09:37
db:PACKETSTORMid:162163date:2021-04-13T20:22:22
db:PACKETSTORMid:162542date:2021-05-12T13:50:51
db:PACKETSTORMid:162541date:2021-05-12T13:50:45
db:CNNVDid:CNNVD-202103-474date:2021-03-05T00:00:00
db:NVDid:CVE-2021-28038date:2021-03-05T18:15:13.127