ID

VAR-202107-1361


CVE

CVE-2021-33909


TITLE

Linux kernel Input validation error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202107-1534

DESCRIPTION

fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.7.21 security and bug fix update Advisory ID: RHSA-2021:2763-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:2763 Issue date: 2021-07-26 CVE Names: CVE-2021-33909 CVE-2021-33910 ===================================================================== 1. Summary: An update is now available for Red Hat OpenShift Container Platform 4.7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 4.7 - noarch, ppc64le, s390x, x86_64 3. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Ansible is a SSH-based configuration management, deployment, and task execution system. The openshift-ansible packages contain Ansible code and playbooks for installing and upgrading OpenShift Container Platform 3. The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Security Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash (CVE-2021-33910) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * kernel-rt: update RT source tree to the RHEL-8.3.z source tree (BZ#1957359) * Placeholder bug for OCP 4.7.0 rpm release (BZ#1983534) 4. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer 1970887 - CVE-2021-33910 systemd: uncontrolled allocation on the stack in function unit_name_path_escape leads to crash 1983534 - Placeholder bug for OCP 4.7.0 rpm release 6. Package List: Red Hat OpenShift Container Platform 4.7: Source: cri-o-1.20.4-4.rhaos4.7.gitf7276ed.el7.src.rpm openshift-4.7.0-202107132131.p0.git.558d959.assembly.stream.el7.src.rpm openshift-ansible-4.7.0-202107070256.p0.git.e1b19c2.assembly.stream.el7.src.rpm openshift-clients-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el7.src.rpm noarch: openshift-ansible-4.7.0-202107070256.p0.git.e1b19c2.assembly.stream.el7.noarch.rpm openshift-ansible-test-4.7.0-202107070256.p0.git.e1b19c2.assembly.stream.el7.noarch.rpm x86_64: cri-o-1.20.4-4.rhaos4.7.gitf7276ed.el7.x86_64.rpm cri-o-debuginfo-1.20.4-4.rhaos4.7.gitf7276ed.el7.x86_64.rpm openshift-clients-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el7.x86_64.rpm openshift-clients-redistributable-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el7.x86_64.rpm openshift-hyperkube-4.7.0-202107132131.p0.git.558d959.assembly.stream.el7.x86_64.rpm Red Hat OpenShift Container Platform 4.7: Source: atomic-openshift-service-idler-4.7.0-202107070256.p0.git.39cfc66.assembly.stream.el8.src.rpm cri-o-1.20.4-4.rhaos4.7.gitf7276ed.el8.src.rpm kernel-4.18.0-240.23.2.el8_3.src.rpm kernel-rt-4.18.0-240.23.2.rt7.79.el8_3.src.rpm openshift-4.7.0-202107132131.p0.git.558d959.assembly.stream.el8.src.rpm openshift-clients-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el8.src.rpm openshift-kuryr-4.7.0-202107070256.p0.git.c7654fb.assembly.stream.el8.src.rpm systemd-239-41.el8_3.3.src.rpm noarch: kernel-abi-whitelists-4.18.0-240.23.2.el8_3.noarch.rpm kernel-doc-4.18.0-240.23.2.el8_3.noarch.rpm openshift-kuryr-cni-4.7.0-202107070256.p0.git.c7654fb.assembly.stream.el8.noarch.rpm openshift-kuryr-common-4.7.0-202107070256.p0.git.c7654fb.assembly.stream.el8.noarch.rpm openshift-kuryr-controller-4.7.0-202107070256.p0.git.c7654fb.assembly.stream.el8.noarch.rpm python3-kuryr-kubernetes-4.7.0-202107070256.p0.git.c7654fb.assembly.stream.el8.noarch.rpm ppc64le: atomic-openshift-service-idler-4.7.0-202107070256.p0.git.39cfc66.assembly.stream.el8.ppc64le.rpm bpftool-4.18.0-240.23.2.el8_3.ppc64le.rpm bpftool-debuginfo-4.18.0-240.23.2.el8_3.ppc64le.rpm cri-o-1.20.4-4.rhaos4.7.gitf7276ed.el8.ppc64le.rpm cri-o-debuginfo-1.20.4-4.rhaos4.7.gitf7276ed.el8.ppc64le.rpm cri-o-debugsource-1.20.4-4.rhaos4.7.gitf7276ed.el8.ppc64le.rpm kernel-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-core-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-cross-headers-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debug-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debug-core-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debug-debuginfo-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debug-devel-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debug-modules-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debug-modules-extra-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debug-modules-internal-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debuginfo-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-devel-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-headers-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-ipaclones-internal-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-modules-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-modules-extra-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-modules-internal-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-selftests-internal-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-tools-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-tools-debuginfo-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-tools-libs-4.18.0-240.23.2.el8_3.ppc64le.rpm kernel-tools-libs-devel-4.18.0-240.23.2.el8_3.ppc64le.rpm openshift-clients-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el8.ppc64le.rpm openshift-hyperkube-4.7.0-202107132131.p0.git.558d959.assembly.stream.el8.ppc64le.rpm perf-4.18.0-240.23.2.el8_3.ppc64le.rpm perf-debuginfo-4.18.0-240.23.2.el8_3.ppc64le.rpm python3-perf-4.18.0-240.23.2.el8_3.ppc64le.rpm python3-perf-debuginfo-4.18.0-240.23.2.el8_3.ppc64le.rpm s390x: atomic-openshift-service-idler-4.7.0-202107070256.p0.git.39cfc66.assembly.stream.el8.s390x.rpm bpftool-4.18.0-240.23.2.el8_3.s390x.rpm bpftool-debuginfo-4.18.0-240.23.2.el8_3.s390x.rpm cri-o-1.20.4-4.rhaos4.7.gitf7276ed.el8.s390x.rpm cri-o-debuginfo-1.20.4-4.rhaos4.7.gitf7276ed.el8.s390x.rpm cri-o-debugsource-1.20.4-4.rhaos4.7.gitf7276ed.el8.s390x.rpm kernel-4.18.0-240.23.2.el8_3.s390x.rpm kernel-core-4.18.0-240.23.2.el8_3.s390x.rpm kernel-cross-headers-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debug-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debug-core-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debug-debuginfo-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debug-devel-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debug-modules-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debug-modules-extra-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debug-modules-internal-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debuginfo-4.18.0-240.23.2.el8_3.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-240.23.2.el8_3.s390x.rpm kernel-devel-4.18.0-240.23.2.el8_3.s390x.rpm kernel-headers-4.18.0-240.23.2.el8_3.s390x.rpm kernel-modules-4.18.0-240.23.2.el8_3.s390x.rpm kernel-modules-extra-4.18.0-240.23.2.el8_3.s390x.rpm kernel-modules-internal-4.18.0-240.23.2.el8_3.s390x.rpm kernel-selftests-internal-4.18.0-240.23.2.el8_3.s390x.rpm kernel-tools-4.18.0-240.23.2.el8_3.s390x.rpm kernel-tools-debuginfo-4.18.0-240.23.2.el8_3.s390x.rpm kernel-zfcpdump-4.18.0-240.23.2.el8_3.s390x.rpm kernel-zfcpdump-core-4.18.0-240.23.2.el8_3.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-240.23.2.el8_3.s390x.rpm kernel-zfcpdump-devel-4.18.0-240.23.2.el8_3.s390x.rpm kernel-zfcpdump-modules-4.18.0-240.23.2.el8_3.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-240.23.2.el8_3.s390x.rpm kernel-zfcpdump-modules-internal-4.18.0-240.23.2.el8_3.s390x.rpm openshift-clients-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el8.s390x.rpm openshift-hyperkube-4.7.0-202107132131.p0.git.558d959.assembly.stream.el8.s390x.rpm perf-4.18.0-240.23.2.el8_3.s390x.rpm perf-debuginfo-4.18.0-240.23.2.el8_3.s390x.rpm python3-perf-4.18.0-240.23.2.el8_3.s390x.rpm python3-perf-debuginfo-4.18.0-240.23.2.el8_3.s390x.rpm x86_64: atomic-openshift-service-idler-4.7.0-202107070256.p0.git.39cfc66.assembly.stream.el8.x86_64.rpm bpftool-4.18.0-240.23.2.el8_3.x86_64.rpm bpftool-debuginfo-4.18.0-240.23.2.el8_3.x86_64.rpm cri-o-1.20.4-4.rhaos4.7.gitf7276ed.el8.x86_64.rpm cri-o-debuginfo-1.20.4-4.rhaos4.7.gitf7276ed.el8.x86_64.rpm cri-o-debugsource-1.20.4-4.rhaos4.7.gitf7276ed.el8.x86_64.rpm kernel-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-core-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-cross-headers-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debug-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debug-core-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debug-debuginfo-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debug-devel-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debug-modules-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debug-modules-extra-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debug-modules-internal-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debuginfo-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-devel-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-headers-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-ipaclones-internal-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-modules-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-modules-extra-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-modules-internal-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-rt-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-core-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-core-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-devel-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-kvm-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-modules-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debug-modules-internal-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debuginfo-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-devel-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-kvm-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-modules-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-modules-extra-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-modules-internal-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-rt-selftests-internal-4.18.0-240.23.2.rt7.79.el8_3.x86_64.rpm kernel-selftests-internal-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-tools-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-tools-debuginfo-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-tools-libs-4.18.0-240.23.2.el8_3.x86_64.rpm kernel-tools-libs-devel-4.18.0-240.23.2.el8_3.x86_64.rpm openshift-clients-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el8.x86_64.rpm openshift-clients-redistributable-4.7.0-202107070256.p0.git.8b4b094.assembly.stream.el8.x86_64.rpm openshift-hyperkube-4.7.0-202107132131.p0.git.558d959.assembly.stream.el8.x86_64.rpm perf-4.18.0-240.23.2.el8_3.x86_64.rpm perf-debuginfo-4.18.0-240.23.2.el8_3.x86_64.rpm python3-perf-4.18.0-240.23.2.el8_3.x86_64.rpm python3-perf-debuginfo-4.18.0-240.23.2.el8_3.x86_64.rpm systemd-239-41.el8_3.3.x86_64.rpm systemd-container-239-41.el8_3.3.x86_64.rpm systemd-container-debuginfo-239-41.el8_3.3.x86_64.rpm systemd-debuginfo-239-41.el8_3.3.x86_64.rpm systemd-debugsource-239-41.el8_3.3.x86_64.rpm systemd-devel-239-41.el8_3.3.x86_64.rpm systemd-journal-remote-239-41.el8_3.3.x86_64.rpm systemd-journal-remote-debuginfo-239-41.el8_3.3.x86_64.rpm systemd-libs-239-41.el8_3.3.x86_64.rpm systemd-libs-debuginfo-239-41.el8_3.3.x86_64.rpm systemd-pam-239-41.el8_3.3.x86_64.rpm systemd-pam-debuginfo-239-41.el8_3.3.x86_64.rpm systemd-tests-239-41.el8_3.3.x86_64.rpm systemd-tests-debuginfo-239-41.el8_3.3.x86_64.rpm systemd-udev-239-41.el8_3.3.x86_64.rpm systemd-udev-debuginfo-239-41.el8_3.3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYP7mF9zjgjWX9erEAQgZ9w//YYzC2fpVCACER7JZoIPkj5kgKpNZb2dl rAWgr+4jY5kTvZWF189Xbte1l82nWPYNhsC159NvlhevkFvNXvq5sCNrjn/5c9r7 4Kcxfoxssz2XS8k5QeOgm1eNaIyRbvO0N2GPJu5hFXqZJgC9Pd1a4aKGECRNT55d hiAbsYgB5BgbC/Zoz1p50p4t8oIQtaurNizNF/gk97WqcLaRHRN3JgxXv5Q7qn0W 6kxA5Vj7MYUnVR18h+GQv9BFxhOGW0E6JWsNXOpRuyyy2ZIDiRcaXL67luB2n24O H6Sc4nOxV4wEZ/0gWfb5YjRdwVdxQXwxa9hegiWX+CeApLUrsvZy0W0Ca/Bc7pbv B+FuHJZMjrAy7ORnILkkSGh1jHO5D3m22SWs3+mokJnUAl9CMFj/l9xbZEli0Nga bxbJg1TSQg30PGc1DQOdeM7i9dNHJGiJw1b89rP/R3W+9eUjtZTdaeD/irwbFTP0 KYCl+KmjnjWayXP+ZfdW0fWwBo1rl5o6bjTai1ztfjZALXaYQpCEyhvZsLbzL+j9 PIRUvwT3TXk0014tPyweLQLRwpOTPFhAro3hgzsLUKFpQhB2vhbR0U8yu/SGRS3z x4SzHQhYcU24UTJxMLUXdRQjniJbRZsyaCpUM0FvSVxzzhpwMiOAR9IZhvOOW5mo aRtMwhGvgzU= =dqQ0 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . This affects kernel/bpf/core.c and net/core/filter.c. (CVE-2018-25020) Maxim Levitsky discovered that the KVM hypervisor implementation for AMD processors in the Linux kernel did not properly prevent a guest VM from enabling AVIC in nested guest VMs. If you are running a kernel version earlier than the one listed below, please upgrade your kernel as soon as possible. 8.2) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v. 8.2) - aarch64, noarch, ppc64le, s390x, x86_64 3. Bug Fix(es): * RHEL8.2 Snapshot2 - tpm: ibmvtpm: Wait for buffer to be set before proceeding (BZ#1933986) * fnic crash from invalid request pointer (BZ#1961707) * [Azure][RHEL8.4] Two Patches Needed To Enable Azure Host Time-syncing in VMs (BZ#1963051) * RHEL kernel 8.2 and higher are affected by data corruption bug in raid1 arrays using bitmaps. (BZ#1969338) 4. 8.1) - ppc64le, x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. (CVE-2021-33909) Michael Brown discovered that the Xen netback driver in the Linux kernel did not properly handle malformed packets from a network PV frontend, leading to a use-after-free vulnerability. ========================================================================== Ubuntu Security Notice USN-5018-1 July 20, 2021 linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-gcp-4.15: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi2: Linux kernel for Raspberry Pi (V8) systems - linux-snapdragon: Linux kernel for Qualcomm Snapdragon processors - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that the virtual file system implementation in the Linux kernel contained an unsigned to signed integer conversion error. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-33909) Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly enforce limits for pointer operations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33200) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly clear received fragments from memory in some situations. A physically proximate attacker could possibly use this issue to inject packets or expose sensitive information. (CVE-2020-24586) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled encrypted fragments. A physically proximate attacker could possibly use this issue to decrypt fragments. (CVE-2020-24587) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled EAPOL frames from unauthenticated senders. A physically proximate attacker could inject malicious packets to cause a denial of service (system crash). (CVE-2020-26139) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147) It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129) Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the nfc implementation in the Linux kernel. A privileged local attacker could use this issue to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23134) Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly prevent speculative loads in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-31829) It was discovered that a race condition in the kernel Bluetooth subsystem could lead to use-after-free of slab objects. An attacker could use this issue to possibly execute arbitrary code. (CVE-2021-32399) It was discovered that a use-after-free existed in the Bluetooth HCI driver of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33034) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1078-oracle 4.15.0-1078.86 linux-image-4.15.0-1092-raspi2 4.15.0-1092.98 linux-image-4.15.0-1097-kvm 4.15.0-1097.99 linux-image-4.15.0-1106-gcp 4.15.0-1106.120 linux-image-4.15.0-1109-aws 4.15.0-1109.116 linux-image-4.15.0-1109-snapdragon 4.15.0-1109.118 linux-image-4.15.0-1121-azure 4.15.0-1121.134 linux-image-4.15.0-151-generic 4.15.0-151.157 linux-image-4.15.0-151-generic-lpae 4.15.0-151.157 linux-image-4.15.0-151-lowlatency 4.15.0-151.157 linux-image-aws-lts-18.04 4.15.0.1109.112 linux-image-azure-lts-18.04 4.15.0.1121.94 linux-image-gcp-lts-18.04 4.15.0.1106.125 linux-image-generic 4.15.0.151.139 linux-image-generic-lpae 4.15.0.151.139 linux-image-kvm 4.15.0.1097.93 linux-image-lowlatency 4.15.0.151.139 linux-image-oracle-lts-18.04 4.15.0.1078.88 linux-image-raspi2 4.15.0.1092.90 linux-image-snapdragon 4.15.0.1109.112 linux-image-virtual 4.15.0.151.139 Ubuntu 16.04 ESM: linux-image-4.15.0-1078-oracle 4.15.0-1078.86~16.04.1 linux-image-4.15.0-1106-gcp 4.15.0-1106.120~16.04.1 linux-image-4.15.0-1109-aws 4.15.0-1109.116~16.04.1 linux-image-4.15.0-1121-azure 4.15.0-1121.134~16.04.1 linux-image-4.15.0-151-generic 4.15.0-151.157~16.04.1 linux-image-4.15.0-151-lowlatency 4.15.0-151.157~16.04.1 linux-image-aws-hwe 4.15.0.1109.100 linux-image-azure 4.15.0.1121.112 linux-image-gcp 4.15.0.1106.107 linux-image-generic-hwe-16.04 4.15.0.151.146 linux-image-gke 4.15.0.1106.107 linux-image-lowlatency-hwe-16.04 4.15.0.151.146 linux-image-oem 4.15.0.151.146 linux-image-oracle 4.15.0.1078.66 linux-image-virtual-hwe-16.04 4.15.0.151.146 Ubuntu 14.04 ESM: linux-image-4.15.0-1121-azure 4.15.0-1121.134~14.04.1 linux-image-azure 4.15.0.1121.94 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5018-1 CVE-2020-24586, CVE-2020-24587, CVE-2020-26139, CVE-2020-26147, CVE-2020-26558, CVE-2021-0129, CVE-2021-23134, CVE-2021-31829, CVE-2021-32399, CVE-2021-33034, CVE-2021-33200, CVE-2021-33909 Package Information: https://launchpad.net/ubuntu/+source/linux/4.15.0-151.157 https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1109.116 https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1121.134 https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1106.120 https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1097.99 https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1078.86 https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1092.98 https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1109.118 . These packages include redhat-release-virtualization-host. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks

Trust: 1.71

sources: NVD: CVE-2021-33909 // VULMON: CVE-2021-33909 // PACKETSTORM: 163682 // PACKETSTORM: 165477 // PACKETSTORM: 163589 // PACKETSTORM: 163590 // PACKETSTORM: 163596 // PACKETSTORM: 163598 // PACKETSTORM: 163599 // PACKETSTORM: 163619

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.5

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:9.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.16

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:8.4

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.12.43

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.276

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.240

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.4.134

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.11

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.13

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.12.19

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.13.4

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.276

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.13

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.52

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:8.3

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:8.2

Trust: 1.0

vendor:sonicwallmodel:sma1000scope:lteversion:12.4.2-02044

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.198

Trust: 1.0

sources: NVD: CVE-2021-33909

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33909
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202107-1534
value: HIGH

Trust: 0.6

VULMON: CVE-2021-33909
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-33909
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

nvd@nist.gov: CVE-2021-33909
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2021-33909 // CNNVD: CNNVD-202107-1534 // NVD: CVE-2021-33909

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-190

Trust: 1.0

sources: NVD: CVE-2021-33909

THREAT TYPE

local

Trust: 0.9

sources: PACKETSTORM: 163596 // PACKETSTORM: 163598 // PACKETSTORM: 163599 // CNNVD: CNNVD-202107-1534

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202107-1534

PATCH

title:Linux kernel Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=157416

Trust: 0.6

title:Amazon Linux AMI: ALAS-2021-1524url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1524

Trust: 0.1

title:Debian Security Advisories: DSA-4941-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=fb9b5f5cc430f484f4420a11b7b87136

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-055url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-055

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.10-2022-003url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.10-2022-003

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1691url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1691

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-057url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-057

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-056url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-056

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-48] linux: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-48

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-50] linux-hardened: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-50

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-005url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-005

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-058

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-059url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-059

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-49] linux-zen: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-49

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-51] linux-lts: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-51

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-33909 log

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:LinuxVulnerabilitiesurl:https://github.com/gitezri/LinuxVulnerabilities

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/AmIAHuman/CVE-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/Liang2580/CVE-2021-33909

Trust: 0.1

title:cve-2021-33909url:https://github.com/baerwolf/cve-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/bbinfosec43/CVE-2021-33909

Trust: 0.1

title:deep-directoryurl:https://github.com/sfowl/deep-directory

Trust: 0.1

title:integer_compilation_flagsurl:https://github.com/mdulin2/integer_compilation_flags

Trust: 0.1

title:CVE-2021-33909url:https://github.com/AlAIAL90/CVE-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/ChrisTheCoolHut/CVE-2021-33909

Trust: 0.1

title: - url:https://github.com/knewbury01/codeql-workshop-integer-conversion

Trust: 0.1

title:kickstart-rhel8url:https://github.com/alexhaydock/kickstart-rhel8

Trust: 0.1

title:exploit_articlesurl:https://github.com/ChoKyuWon/exploit_articles

Trust: 0.1

title: - url:https://github.com/hardenedvault/ved

Trust: 0.1

title:SVG-advisoriesurl:https://github.com/EGI-Federation/SVG-advisories

Trust: 0.1

title: - url:https://github.com/makoto56/penetration-suite-toolkit

Trust: 0.1

sources: VULMON: CVE-2021-33909 // CNNVD: CNNVD-202107-1534

EXTERNAL IDS

db:NVDid:CVE-2021-33909

Trust: 2.5

db:PACKETSTORMid:165477

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2021/09/21/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/07/20/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/09/17/4

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/07/22/7

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/09/17/2

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/08/25/10

Trust: 1.6

db:PACKETSTORMid:163621

Trust: 1.6

db:PACKETSTORMid:163671

Trust: 1.6

db:PACKETSTORMid:164155

Trust: 1.6

db:PACKETSTORMid:163682

Trust: 0.7

db:PACKETSTORMid:163568

Trust: 0.6

db:PACKETSTORMid:163634

Trust: 0.6

db:PACKETSTORMid:163577

Trust: 0.6

db:AUSCERTid:ESB-2022.0060

Trust: 0.6

db:AUSCERTid:ESB-2022.3346

Trust: 0.6

db:AUSCERTid:ESB-2021.3796

Trust: 0.6

db:AUSCERTid:ESB-2021.2589

Trust: 0.6

db:AUSCERTid:ESB-2021.3070

Trust: 0.6

db:AUSCERTid:ESB-2021.2547

Trust: 0.6

db:AUSCERTid:ESB-2021.2461

Trust: 0.6

db:AUSCERTid:ESB-2021.2453

Trust: 0.6

db:AUSCERTid:ESB-2021.2749

Trust: 0.6

db:AUSCERTid:ESB-2021.2543

Trust: 0.6

db:AUSCERTid:ESB-2021.2597

Trust: 0.6

db:AUSCERTid:ESB-2021.2583

Trust: 0.6

db:AUSCERTid:ESB-2021.2444

Trust: 0.6

db:AUSCERTid:ESB-2021.2657

Trust: 0.6

db:AUSCERTid:ESB-2021.2691

Trust: 0.6

db:AUSCERTid:ESB-2021.2532

Trust: 0.6

db:AUSCERTid:ESB-2021.4089

Trust: 0.6

db:CS-HELPid:SB2021072222

Trust: 0.6

db:CS-HELPid:SB2021122404

Trust: 0.6

db:CS-HELPid:SB2021072291

Trust: 0.6

db:CS-HELPid:SB2021080304

Trust: 0.6

db:CS-HELPid:SB2021072623

Trust: 0.6

db:CS-HELPid:SB2022012748

Trust: 0.6

db:CNNVDid:CNNVD-202107-1534

Trust: 0.6

db:VULMONid:CVE-2021-33909

Trust: 0.1

db:PACKETSTORMid:163589

Trust: 0.1

db:PACKETSTORMid:163590

Trust: 0.1

db:PACKETSTORMid:163596

Trust: 0.1

db:PACKETSTORMid:163598

Trust: 0.1

db:PACKETSTORMid:163599

Trust: 0.1

db:PACKETSTORMid:163619

Trust: 0.1

sources: VULMON: CVE-2021-33909 // PACKETSTORM: 163682 // PACKETSTORM: 165477 // PACKETSTORM: 163589 // PACKETSTORM: 163590 // PACKETSTORM: 163596 // PACKETSTORM: 163598 // PACKETSTORM: 163599 // PACKETSTORM: 163619 // CNNVD: CNNVD-202107-1534 // NVD: CVE-2021-33909

REFERENCES

url:http://packetstormsecurity.com/files/165477/kernel-live-patch-security-notice-lsn-0083-1.html

Trust: 2.2

url:http://packetstormsecurity.com/files/163671/kernel-live-patch-security-notice-lsn-0079-1.html

Trust: 2.2

url:http://packetstormsecurity.com/files/164155/kernel-live-patch-security-notice-lsn-0081-1.html

Trust: 2.2

url:https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/09/17/2

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/09/17/4

Trust: 1.6

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/08/25/10

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html

Trust: 1.6

url:https://www.openwall.com/lists/oss-security/2021/07/20/1

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/09/21/1

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/07/22/7

Trust: 1.6

url:http://packetstormsecurity.com/files/163621/sequoia-a-deep-root-in-linuxs-filesystem-layer.html

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html

Trust: 1.6

url:https://www.debian.org/security/2021/dsa-4941

Trust: 1.6

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2022-0015

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20210819-0004/

Trust: 1.6

url:https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.13.4

Trust: 1.6

url:https://access.redhat.com/security/cve/cve-2021-33909

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/z4uhhigiso3fvrf4cqnjs4ika25atsfu/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-33909

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/z4uhhigiso3fvrf4cqnjs4ika25atsfu/

Trust: 0.6

url:https://packetstormsecurity.com/files/163634/red-hat-security-advisory-2021-2736-01.html

Trust: 0.6

url:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-integer-overflow-via-seq-set-overflow-35938

Trust: 0.6

url:https://packetstormsecurity.com/files/163577/red-hat-security-advisory-2021-2733-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021080304

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072623

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2657

Trust: 0.6

url:https://source.android.com/security/bulletin/2021-12-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0060

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072222

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6490825

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2583

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2461

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2444

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2543

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4089

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3796

Trust: 0.6

url:https://packetstormsecurity.com/files/163568/red-hat-security-advisory-2021-2734-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3070

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3346

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072291

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2547

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2589

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2749

Trust: 0.6

url:https://packetstormsecurity.com/files/163682/red-hat-security-advisory-2021-2763-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2691

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2532

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6525250

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2597

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012748

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2453

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122404

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/security/team/key/

Trust: 0.4

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-006

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-33034

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33034

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-26558

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33910

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2763

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3653

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25020

Trust: 0.1

url:https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-35508

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25704

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2718

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35508

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25704

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2723

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3564

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1038.40

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5015-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3573

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3587

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28691

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1021.22

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1049.53~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1049.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1052.56~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1041.45

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1044.46

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5017-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1049.52~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-80.90~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1054.57~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1055.57

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1052.56

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1049.52

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1055.57~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1054.57

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-80.90

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1021.22~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1041.45~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-151.157

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1097.99

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1078.86

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1106.120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33200

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5018-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-32399

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24586

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1109.116

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1092.98

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1121.134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24587

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-23134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-31829

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1109.118

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26139

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2737

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

sources: PACKETSTORM: 163682 // PACKETSTORM: 165477 // PACKETSTORM: 163589 // PACKETSTORM: 163590 // PACKETSTORM: 163596 // PACKETSTORM: 163598 // PACKETSTORM: 163599 // PACKETSTORM: 163619 // CNNVD: CNNVD-202107-1534 // NVD: CVE-2021-33909

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 163682 // PACKETSTORM: 163589 // PACKETSTORM: 163590 // PACKETSTORM: 163619

SOURCES

db:VULMONid:CVE-2021-33909
db:PACKETSTORMid:163682
db:PACKETSTORMid:165477
db:PACKETSTORMid:163589
db:PACKETSTORMid:163590
db:PACKETSTORMid:163596
db:PACKETSTORMid:163598
db:PACKETSTORMid:163599
db:PACKETSTORMid:163619
db:CNNVDid:CNNVD-202107-1534
db:NVDid:CVE-2021-33909

LAST UPDATE DATE

2026-01-23T21:24:46.974000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-33909date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202107-1534date:2022-12-12T00:00:00
db:NVDid:CVE-2021-33909date:2023-11-07T03:35:56.050

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-33909date:2021-07-20T00:00:00
db:PACKETSTORMid:163682date:2021-07-27T14:47:55
db:PACKETSTORMid:165477date:2022-01-06T18:14:08
db:PACKETSTORMid:163589date:2021-07-21T16:03:31
db:PACKETSTORMid:163590date:2021-07-21T16:03:37
db:PACKETSTORMid:163596date:2021-07-21T16:04:22
db:PACKETSTORMid:163598date:2021-07-21T16:04:36
db:PACKETSTORMid:163599date:2021-07-21T16:04:42
db:PACKETSTORMid:163619date:2021-07-21T16:07:24
db:CNNVDid:CNNVD-202107-1534date:2021-07-20T00:00:00
db:NVDid:CVE-2021-33909date:2021-07-20T19:15:09.747