ID

VAR-202104-1670


CVE

CVE-2021-3506


TITLE

Linux Kernel  Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-005924

DESCRIPTION

An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability. Linux Kernel Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. The vulnerability stems from a boundary check failure. ========================================================================== Ubuntu Security Notice USN-4997-2 June 25, 2021 linux-kvm vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-kvm: Linux kernel for cloud environments Details: USN-4997-1 fixed vulnerabilities in the Linux kernel for Ubuntu 21.04. This update provides the corresponding updates for the Linux KVM kernel for Ubuntu 21.04. Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly enforce limits for pointer operations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33200) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly clear received fragments from memory in some situations. A physically proximate attacker could possibly use this issue to inject packets or expose sensitive information. (CVE-2020-24586) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled encrypted fragments. A physically proximate attacker could possibly use this issue to decrypt fragments. (CVE-2020-24587) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled certain malformed frames. If a user were tricked into connecting to a malicious server, a physically proximate attacker could use this issue to inject packets. (CVE-2020-24588) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled EAPOL frames from unauthenticated senders. A physically proximate attacker could inject malicious packets to cause a denial of service (system crash). (CVE-2020-26139) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly verify certain fragmented frames. A physically proximate attacker could possibly use this issue to inject or decrypt packets. (CVE-2020-26141) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation accepted plaintext fragments in certain situations. A physically proximate attacker could use this issue to inject packets. (CVE-2020-26145) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147) Or Cohen discovered that the SCTP implementation in the Linux kernel contained a race condition in some situations, leading to a use-after-free condition. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23133) Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the nfc implementation in the Linux kernel. A privileged local attacker could use this issue to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23134) Manfred Paul discovered that the extended Berkeley Packet Filter (eBPF) implementation in the Linux kernel contained an out-of-bounds vulnerability. A local attacker could use this issue to execute arbitrary code. (CVE-2021-31440) Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly prevent speculative loads in certain situations. (CVE-2021-31829) It was discovered that a race condition in the kernel Bluetooth subsystem could lead to use-after-free of slab objects. An attacker could use this issue to possibly execute arbitrary code. (CVE-2021-32399) It was discovered that a use-after-free existed in the Bluetooth HCI driver of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A local attacker could use this issue to cause a denial of service (system crash). (CVE-2021-3506) Mathias Krause discovered that a null pointer dereference existed in the Nitro Enclaves kernel driver of the Linux kernel. A local attacker could use this issue to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3543) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: linux-image-5.11.0-1009-kvm 5.11.0-1009.9 linux-image-kvm 5.11.0.1009.9 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4997-1 CVE-2020-24586, CVE-2020-24587, CVE-2020-24588, CVE-2020-26139, CVE-2020-26141, CVE-2020-26145, CVE-2020-26147, CVE-2021-23133, CVE-2021-23134, CVE-2021-31440, CVE-2021-31829, CVE-2021-32399, CVE-2021-33034, CVE-2021-33200, CVE-2021-3506, CVE-2021-3543, CVE-2021-3609 Package Information: https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9

Trust: 2.43

sources: NVD: CVE-2021-3506 // JVNDB: JVNDB-2021-005924 // VULHUB: VHN-391284 // VULMON: CVE-2021-3506 // PACKETSTORM: 163253 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163249 // PACKETSTORM: 163597 // PACKETSTORM: 166400

AFFECTED PRODUCTS

vendor:netappmodel:solidfire baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:eqversion:5.12

Trust: 1.0

vendor:netappmodel:cloud backupscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h300escope:eqversion: -

Trust: 1.0

vendor:netappmodel:h500escope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h700escope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.12

Trust: 1.0

vendor:linuxmodel:kernelscope:eqversion:5.12.0-rc4

Trust: 0.8

vendor:linuxmodel:kernelscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-005924 // NVD: CVE-2021-3506

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-3506
value: HIGH

Trust: 1.0

NVD: CVE-2021-3506
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202104-1357
value: HIGH

Trust: 0.6

VULHUB: VHN-391284
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-3506
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-3506
severity: MEDIUM
baseScore: 5.6
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-391284
severity: MEDIUM
baseScore: 5.6
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-3506
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2021-3506
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-391284 // VULMON: CVE-2021-3506 // JVNDB: JVNDB-2021-005924 // CNNVD: CNNVD-202104-1357 // NVD: CVE-2021-3506

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:Out-of-bounds read (CWE-125) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-391284 // JVNDB: JVNDB-2021-005924 // NVD: CVE-2021-3506

THREAT TYPE

local

Trust: 1.3

sources: PACKETSTORM: 163253 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163249 // PACKETSTORM: 163597 // PACKETSTORM: 166400 // CNNVD: CNNVD-202104-1357

TYPE

arbitrary

Trust: 0.6

sources: PACKETSTORM: 163253 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163249 // PACKETSTORM: 163597

PATCH

title:[PATCH] f2fsurl:http://www.kernel.org

Trust: 0.8

title:Linux kernel Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=148827

Trust: 0.6

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-3506 log

Trust: 0.1

sources: VULMON: CVE-2021-3506 // JVNDB: JVNDB-2021-005924 // CNNVD: CNNVD-202104-1357

EXTERNAL IDS

db:NVDid:CVE-2021-3506

Trust: 4.1

db:OPENWALLid:OSS-SECURITY/2021/03/28/2

Trust: 2.6

db:OPENWALLid:OSS-SECURITY/2021/05/08/1

Trust: 2.6

db:PACKETSTORMid:163291

Trust: 0.8

db:PACKETSTORMid:163249

Trust: 0.8

db:PACKETSTORMid:166400

Trust: 0.8

db:ICS CERTid:ICSA-24-319-06

Trust: 0.8

db:JVNid:JVNVU96191615

Trust: 0.8

db:JVNDBid:JVNDB-2021-005924

Trust: 0.8

db:PACKETSTORMid:166417

Trust: 0.7

db:CNNVDid:CNNVD-202104-1357

Trust: 0.7

db:PACKETSTORMid:163597

Trust: 0.7

db:CS-HELPid:SB2021051016

Trust: 0.6

db:CS-HELPid:SB2022032316

Trust: 0.6

db:AUSCERTid:ESB-2021.2216

Trust: 0.6

db:AUSCERTid:ESB-2022.1235

Trust: 0.6

db:AUSCERTid:ESB-2021.2453

Trust: 0.6

db:AUSCERTid:ESB-2021.2249

Trust: 0.6

db:PACKETSTORMid:163255

Trust: 0.2

db:PACKETSTORMid:163301

Trust: 0.2

db:PACKETSTORMid:163253

Trust: 0.2

db:VULHUBid:VHN-391284

Trust: 0.1

db:VULMONid:CVE-2021-3506

Trust: 0.1

sources: VULHUB: VHN-391284 // VULMON: CVE-2021-3506 // JVNDB: JVNDB-2021-005924 // PACKETSTORM: 163253 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163249 // PACKETSTORM: 163597 // PACKETSTORM: 166400 // CNNVD: CNNVD-202104-1357 // NVD: CVE-2021-3506

REFERENCES

url:https://www.openwall.com/lists/oss-security/2021/03/28/2

Trust: 2.6

url:http://www.openwall.com/lists/oss-security/2021/05/08/1

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-3506

Trust: 2.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=1944298

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20210611-0007/

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html

Trust: 1.7

url:https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2520013.html

Trust: 1.0

url:https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2520013.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96191615/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-32399

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-23134

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33034

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1235

Trust: 0.6

url:https://packetstormsecurity.com/files/166400/ubuntu-security-notice-usn-5339-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163291/ubuntu-security-notice-usn-5000-2.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051016

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2216

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2249

Trust: 0.6

url:https://packetstormsecurity.com/files/166417/ubuntu-security-notice-usn-5343-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163249/ubuntu-security-notice-usn-4997-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2453

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032316

Trust: 0.6

url:https://packetstormsecurity.com/files/163597/ubuntu-security-notice-usn-5016-1.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-out-of-bounds-memory-reading-via-remove-nats-in-journal-35115

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-26147

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-24588

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-24586

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26145

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-23133

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-24587

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-3609

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26141

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26139

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-33200

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-31829

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3543

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-31440

Trust: 0.3

url:https://ubuntu.com/security/notices/usn-5000-1

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-4997-1

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://seclists.org/oss-sec/2021/q2/107

Trust: 0.1

url:https://security.archlinux.org/cve-2021-3506

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1046.49

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1048.52

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1051.53~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1051.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1018.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1038.41

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1046.48~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1018.19~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-77.86~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1038.41~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-77.86

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1051.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1046.49~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1051.53~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1048.52~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1046.48

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5001-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1033.34

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5000-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1041.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4997-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.11.0-1010.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.11.0-1011.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.11.0-1012.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.11.0-1011.12

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.11.0-1009.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.11.0-22.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-63.71~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1041.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1038.40

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5016-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.8/5.8.0-1041.43~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.8.0-63.71

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33909

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.8/5.8.0-1037.38~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1039.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.8.0-1032.35

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1037.38

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.8/5.8.0-1039.42~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1033.36

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.8/5.8.0-1038.40~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1134.147

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1123.132

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1119.133

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-44733

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1038.43

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43976

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-173.182

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1124.133

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5339-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45095

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1090.99

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1110.113

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0492

Trust: 0.1

sources: VULHUB: VHN-391284 // VULMON: CVE-2021-3506 // JVNDB: JVNDB-2021-005924 // PACKETSTORM: 163253 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163249 // PACKETSTORM: 163597 // PACKETSTORM: 166400 // CNNVD: CNNVD-202104-1357 // NVD: CVE-2021-3506

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 163253 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163249 // PACKETSTORM: 163597 // PACKETSTORM: 166400

SOURCES

db:VULHUBid:VHN-391284
db:VULMONid:CVE-2021-3506
db:JVNDBid:JVNDB-2021-005924
db:PACKETSTORMid:163253
db:PACKETSTORMid:163255
db:PACKETSTORMid:163291
db:PACKETSTORMid:163301
db:PACKETSTORMid:163249
db:PACKETSTORMid:163597
db:PACKETSTORMid:166400
db:CNNVDid:CNNVD-202104-1357
db:NVDid:CVE-2021-3506

LAST UPDATE DATE

2025-01-10T20:31:37.148000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-391284date:2022-01-21T00:00:00
db:VULMONid:CVE-2021-3506date:2021-05-08T00:00:00
db:JVNDBid:JVNDB-2021-005924date:2024-11-19T02:38:00
db:CNNVDid:CNNVD-202104-1357date:2022-03-24T00:00:00
db:NVDid:CVE-2021-3506date:2024-11-21T06:21:42.427

SOURCES RELEASE DATE

db:VULHUBid:VHN-391284date:2021-04-19T00:00:00
db:VULMONid:CVE-2021-3506date:2021-04-19T00:00:00
db:JVNDBid:JVNDB-2021-005924date:2021-12-22T00:00:00
db:PACKETSTORMid:163253date:2021-06-23T15:38:23
db:PACKETSTORMid:163255date:2021-06-23T15:41:26
db:PACKETSTORMid:163291date:2021-06-27T12:22:22
db:PACKETSTORMid:163301date:2021-06-28T16:22:26
db:PACKETSTORMid:163249date:2021-06-23T15:33:13
db:PACKETSTORMid:163597date:2021-07-21T16:04:29
db:PACKETSTORMid:166400date:2022-03-22T15:35:42
db:CNNVDid:CNNVD-202104-1357date:2021-04-19T00:00:00
db:NVDid:CVE-2021-3506date:2021-04-19T22:15:13.110