ID

VAR-202112-1696


CVE

CVE-2021-44733


TITLE

Linux kernel Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202112-2166

DESCRIPTION

A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object. ========================================================================== Ubuntu Security Notice USN-5368-1 April 06, 2022 linux-azure-5.13, linux-oracle-5.13 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux-azure-5.13: Linux kernel for Microsoft Azure cloud systems - linux-oracle-5.13: Linux kernel for Oracle Cloud systems Details: It was discovered that the BPF verifier in the Linux kernel did not properly restrict pointer types in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-23222) It was discovered that the network traffic control implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1055) Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492) J\xfcrgen Gro\xdf discovered that the Xen subsystem within the Linux kernel did not adequately limit the number of events driver domains (unprivileged PV backends) could send to other guest VMs. An attacker in a driver domain could use this to cause a denial of service in other guest VMs. (CVE-2021-28711, CVE-2021-28712, CVE-2021-28713) J\xfcrgen Gro\xdf discovered that the Xen network backend driver in the Linux kernel did not adequately limit the amount of queued packets when a guest did not process them. An attacker in a guest VM can use this to cause a denial of service (excessive kernel memory consumption) in the network backend domain. (CVE-2021-28714, CVE-2021-28715) Szymon Heidrich discovered that the USB Gadget subsystem in the Linux kernel did not properly restrict the size of control requests for certain gadget types, leading to possible out of bounds reads or writes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39685) It was discovered that a race condition existed in the poll implementation in the Linux kernel, resulting in a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-39698) It was discovered that the simulated networking device driver for the Linux kernel did not properly initialize memory in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-4135) Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker could possibly use this to gain administrative privileges. (CVE-2021-4197) Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device driver in the Linux kernel did not properly validate meta-data coming from the device. A local attacker who can control an emulated device can use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-43975) It was discovered that the ARM Trusted Execution Environment (TEE) subsystem in the Linux kernel contained a race condition leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-44733) It was discovered that the Phone Network protocol (PhoNet) implementation in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2021-45095) It was discovered that the eBPF verifier in the Linux kernel did not properly perform bounds checking on mov32 operations. A local attacker could use this to expose sensitive information (kernel pointer addresses). (CVE-2021-45402) It was discovered that the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel did not properly deallocate memory in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2021-45480) It was discovered that the BPF subsystem in the Linux kernel did not properly track pointer types on atomic fetch operations in some situations. A local attacker could use this to expose sensitive information (kernel pointer addresses). (CVE-2022-0264) It was discovered that the TIPC Protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0382) Samuel Page discovered that the Transparent Inter-Process Communication (TIPC) protocol implementation in the Linux kernel contained a stack-based buffer overflow. A remote attacker could use this to cause a denial of service (system crash) for systems that have a TIPC bearer configured. (CVE-2022-0435) It was discovered that the KVM implementation for s390 systems in the Linux kernel did not properly prevent memory operations on PVM guests that were in non-protected mode. A local attacker could use this to obtain unauthorized memory write access. (CVE-2022-0516) It was discovered that the ICMPv6 implementation in the Linux kernel did not properly deallocate memory in certain situations. A remote attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2022-0742) It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-27666) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.13.0-1021-azure 5.13.0-1021.24~20.04.1 linux-image-5.13.0-1025-oracle 5.13.0-1025.30~20.04.1 linux-image-azure 5.13.0.1021.24~20.04.10 linux-image-oracle 5.13.0.1025.30~20.04.1 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5368-1 CVE-2021-28711, CVE-2021-28712, CVE-2021-28713, CVE-2021-28714, CVE-2021-28715, CVE-2021-39685, CVE-2021-39698, CVE-2021-4135, CVE-2021-4197, CVE-2021-43975, CVE-2021-44733, CVE-2021-45095, CVE-2021-45402, CVE-2021-45480, CVE-2022-0264, CVE-2022-0382, CVE-2022-0435, CVE-2022-0492, CVE-2022-0516, CVE-2022-0742, CVE-2022-1055, CVE-2022-23222, CVE-2022-27666 Package Information: https://launchpad.net/ubuntu/+source/linux-azure-5.13/5.13.0-1021.24~20.04.1 https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1025.30~20.04.1 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2022:1988-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:1988 Issue date: 2022-05-10 CVE Names: CVE-2020-0404 CVE-2020-4788 CVE-2020-13974 CVE-2020-27820 CVE-2021-0941 CVE-2021-3612 CVE-2021-3669 CVE-2021-3743 CVE-2021-3744 CVE-2021-3752 CVE-2021-3759 CVE-2021-3764 CVE-2021-3772 CVE-2021-3773 CVE-2021-4002 CVE-2021-4037 CVE-2021-4083 CVE-2021-4157 CVE-2021-4197 CVE-2021-4203 CVE-2021-20322 CVE-2021-21781 CVE-2021-26401 CVE-2021-29154 CVE-2021-37159 CVE-2021-41864 CVE-2021-42739 CVE-2021-43056 CVE-2021-43389 CVE-2021-43976 CVE-2021-44733 CVE-2021-45485 CVE-2021-45486 CVE-2022-0001 CVE-2022-0002 CVE-2022-0286 CVE-2022-0322 CVE-2022-1011 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Security Fix(es): * kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) * kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404) * kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788) * kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974) * kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941) * kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612) * kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669) * kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743) * kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744) * kernel: possible use-after-free in bluetooth module (CVE-2021-3752) * kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759) * kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764) * kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772) * kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773) * kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002) * kernel: security regression for CVE-2018-13405 (CVE-2021-4037) * kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157) * kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197) * kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203) * kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322) * kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781) * hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) * kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159) * kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864) * kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) * kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056) * kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389) * kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976) * kernel: use-after-free in the TEE subsystem (CVE-2021-44733) * kernel: information leak in the IPv6 implementation (CVE-2021-45485) * kernel: information leak in the IPv4 implementation (CVE-2021-45486) * hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001) * hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002) * kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286) * kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322) * kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011) * kernel: use-after-free in nouveau kernel module (CVE-2020-27820) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1888433 - CVE-2020-4788 kernel: speculation on incompletely validated data on IBM Power9 1901726 - CVE-2020-27820 kernel: use-after-free in nouveau kernel module 1919791 - CVE-2020-0404 kernel: avoid cyclic entity chains due to malformed USB descriptors 1946684 - CVE-2021-29154 kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation 1951739 - CVE-2021-42739 kernel: Heap buffer overflow in firedtv driver 1957375 - [RFE] x86, tsc: Add kcmdline args for skipping tsc calibration sequences 1974079 - CVE-2021-3612 kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() 1981950 - CVE-2021-21781 kernel: arm: SIGPAGE information disclosure vulnerability 1983894 - Hostnetwork pod to service backed by hostnetwork on the same node is not working with OVN Kubernetes 1985353 - CVE-2021-37159 kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c 1986473 - CVE-2021-3669 kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts 1994390 - FIPS: deadlock between PID 1 and "modprobe crypto-jitterentropy_rng" at boot, preventing system to boot 1997338 - block: update to upstream v5.14 1997467 - CVE-2021-3764 kernel: DoS in ccp_run_aes_gcm_cmd() function 1997961 - CVE-2021-3743 kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c 1999544 - CVE-2021-3752 kernel: possible use-after-free in bluetooth module 1999675 - CVE-2021-3759 kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks 2000627 - CVE-2021-3744 kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() 2000694 - CVE-2021-3772 kernel: sctp: Invalid chunks may be used to remotely remove existing associations 2004949 - CVE-2021-3773 kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients 2009312 - Incorrect system time reported by the cpu guest statistics (PPC only). 2009521 - XFS: sync to upstream v5.11 2010463 - CVE-2021-41864 kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write 2011104 - statfs reports wrong free space for small quotas 2013180 - CVE-2021-43389 kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c 2014230 - CVE-2021-20322 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies 2015525 - SCTP peel-off with SELinux and containers in OCP 2015755 - zram: zram leak with warning when running zram02.sh in ltp 2016169 - CVE-2020-13974 kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c 2017073 - CVE-2021-43056 kernel: ppc: kvm: allows a malicious KVM guest to crash the host 2017796 - ceph omnibus backport for RHEL-8.6.0 2018205 - CVE-2021-0941 kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free 2022814 - Rebase the input and HID stack in 8.6 to v5.15 2025003 - CVE-2021-43976 kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device 2025726 - CVE-2021-4002 kernel: possible leak or coruption of data residing on hugetlbfs 2027239 - CVE-2021-4037 kernel: security regression for CVE-2018-13405 2029923 - CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it 2030476 - Kernel 4.18.0-348.2.1 secpath_cache memory leak involving strongswan tunnel 2030747 - CVE-2021-44733 kernel: use-after-free in the TEE subsystem 2031200 - rename(2) fails on subfolder mounts when the share path has a trailing slash 2034342 - CVE-2021-4157 kernel: Buffer overwrite in decode_nfs_fh function 2035652 - CVE-2021-4197 kernel: cgroup: Use open-time creds and namespace for migration perm checks 2036934 - CVE-2021-4203 kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses 2037019 - CVE-2022-0286 kernel: Local denial of service in bond_ipsec_add_sa 2039911 - CVE-2021-45485 kernel: information leak in the IPv6 implementation 2039914 - CVE-2021-45486 kernel: information leak in the IPv4 implementation 2042798 - [RHEL8.6][sfc] General sfc driver update 2042822 - CVE-2022-0322 kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c 2043453 - [RHEL8.6 wireless] stack & drivers general update to v5.16+ 2046021 - kernel 4.18.0-358.el8 async dirops causes write errors with namespace restricted caps 2048251 - Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode 2061700 - CVE-2021-26401 hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 2061712 - CVE-2022-0001 hw: cpu: intel: Branch History Injection (BHI) 2061721 - CVE-2022-0002 hw: cpu: intel: Intra-Mode BTI 2064855 - CVE-2022-1011 kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes 6. Package List: Red Hat Enterprise Linux BaseOS (v. 8): Source: kernel-4.18.0-372.9.1.el8.src.rpm aarch64: bpftool-4.18.0-372.9.1.el8.aarch64.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-4.18.0-372.9.1.el8.aarch64.rpm kernel-core-4.18.0-372.9.1.el8.aarch64.rpm kernel-cross-headers-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-core-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-devel-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-modules-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.9.1.el8.aarch64.rpm kernel-devel-4.18.0-372.9.1.el8.aarch64.rpm kernel-headers-4.18.0-372.9.1.el8.aarch64.rpm kernel-modules-4.18.0-372.9.1.el8.aarch64.rpm kernel-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-libs-4.18.0-372.9.1.el8.aarch64.rpm perf-4.18.0-372.9.1.el8.aarch64.rpm perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm python3-perf-4.18.0-372.9.1.el8.aarch64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm noarch: kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm kernel-doc-4.18.0-372.9.1.el8.noarch.rpm ppc64le: bpftool-4.18.0-372.9.1.el8.ppc64le.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-4.18.0-372.9.1.el8.ppc64le.rpm kernel-core-4.18.0-372.9.1.el8.ppc64le.rpm kernel-cross-headers-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-core-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-devel-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-modules-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.9.1.el8.ppc64le.rpm kernel-devel-4.18.0-372.9.1.el8.ppc64le.rpm kernel-headers-4.18.0-372.9.1.el8.ppc64le.rpm kernel-modules-4.18.0-372.9.1.el8.ppc64le.rpm kernel-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-libs-4.18.0-372.9.1.el8.ppc64le.rpm perf-4.18.0-372.9.1.el8.ppc64le.rpm perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm python3-perf-4.18.0-372.9.1.el8.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm s390x: bpftool-4.18.0-372.9.1.el8.s390x.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-4.18.0-372.9.1.el8.s390x.rpm kernel-core-4.18.0-372.9.1.el8.s390x.rpm kernel-cross-headers-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-core-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-devel-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-modules-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.s390x.rpm kernel-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-372.9.1.el8.s390x.rpm kernel-devel-4.18.0-372.9.1.el8.s390x.rpm kernel-headers-4.18.0-372.9.1.el8.s390x.rpm kernel-modules-4.18.0-372.9.1.el8.s390x.rpm kernel-modules-extra-4.18.0-372.9.1.el8.s390x.rpm kernel-tools-4.18.0-372.9.1.el8.s390x.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-core-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-devel-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-modules-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-372.9.1.el8.s390x.rpm perf-4.18.0-372.9.1.el8.s390x.rpm perf-debuginfo-4.18.0-372.9.1.el8.s390x.rpm python3-perf-4.18.0-372.9.1.el8.s390x.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.s390x.rpm x86_64: bpftool-4.18.0-372.9.1.el8.x86_64.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-4.18.0-372.9.1.el8.x86_64.rpm kernel-core-4.18.0-372.9.1.el8.x86_64.rpm kernel-cross-headers-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-core-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-devel-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-modules-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.9.1.el8.x86_64.rpm kernel-devel-4.18.0-372.9.1.el8.x86_64.rpm kernel-headers-4.18.0-372.9.1.el8.x86_64.rpm kernel-modules-4.18.0-372.9.1.el8.x86_64.rpm kernel-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-libs-4.18.0-372.9.1.el8.x86_64.rpm perf-4.18.0-372.9.1.el8.x86_64.rpm perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm python3-perf-4.18.0-372.9.1.el8.x86_64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm Red Hat CodeReady Linux Builder (v. 8): aarch64: bpftool-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-libs-devel-4.18.0-372.9.1.el8.aarch64.rpm perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-libs-devel-4.18.0-372.9.1.el8.ppc64le.rpm perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-libs-devel-4.18.0-372.9.1.el8.x86_64.rpm perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnqSF9zjgjWX9erEAQjBXQ/8DSpFUMNN6ZVFtli2KuVowVLS+14J0jtj 0zxpr0skJT8vVulU3VTeURBMdg9NAo9bj3R5KTk2+dC+AMuHET5aoVvaYmimBGKL 5qzpu7q9Z0aaD2I288suHCnYuRJnt+qKZtNa4hlcY92bN0tcYBonxsdIS2xM6xIu GHNS8HNVUNz4PuCBfmbITvgX9Qx+iZQVlVccDBG5LDpVwgOtnrxHKbe5E499v/9M oVoN+eV9ulHAZdCHWlUAahbsvEqDraCKNT0nHq/xO5dprPjAcjeKYMeaICtblRr8 k+IouGywaN+mW4sBjnaaiuw2eAtoXq/wHisX1iUdNkroqcx9NBshWMDBJnE4sxQJ ZOSc8B6yjJItPvUI7eD3BDgoka/mdoyXTrg+9VRrir6vfDHPrFySLDrO1O5HM5fO 3sExCVO2VM7QMCGHJ1zXXX4szk4SV/PRsjEesvHOyR2xTKZZWMsXe1h9gYslbADd tW0yco/G23xjxqOtMKuM/nShBChflMy9apssldiOfdqODJMv5d4rRpt0xgmtSOM6 qReveuQCasmNrGlAHgDwbtWz01fmSuk9eYDhZNmHA3gxhoHIV/y+wr0CLbOQtDxT p79nhiqwUo5VMj/X30Lu0Wl3ptLuhRWamzTCkEEzdubr8aVsT4RRNQU3KfVFfpT1 MWp/2ui3i80= =Fdgy -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 8) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements

Trust: 1.62

sources: NVD: CVE-2021-44733 // VULMON: CVE-2021-44733 // PACKETSTORM: 166400 // PACKETSTORM: 166397 // PACKETSTORM: 166392 // PACKETSTORM: 166708 // PACKETSTORM: 166636 // PACKETSTORM: 167097 // PACKETSTORM: 167072

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:8.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:baseboard management controllerscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:linuxmodel:kernelscope:lteversion:5.15.11

Trust: 1.0

sources: NVD: CVE-2021-44733

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2021-44733
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202112-2166
value: HIGH

Trust: 0.6

VULMON: CVE-2021-44733
value: MEDIUM

Trust: 0.1

NVD: CVE-2021-44733
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.1

NVD: CVE-2021-44733
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULMON: CVE-2021-44733 // CNNVD: CNNVD-202112-2166 // NVD: CVE-2021-44733

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.0

sources: NVD: CVE-2021-44733

THREAT TYPE

local

Trust: 1.1

sources: PACKETSTORM: 166400 // PACKETSTORM: 166397 // PACKETSTORM: 166392 // PACKETSTORM: 166708 // PACKETSTORM: 166636 // CNNVD: CNNVD-202112-2166

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202112-2166

CONFIGURATIONS

sources: NVD: CVE-2021-44733

PATCH

title:Linux kernel Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176462

Trust: 0.6

title:Red Hat: CVE-2021-44733url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2021-44733

Trust: 0.1

title:Ubuntu Security Notice: USN-5339-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-5339-1

Trust: 0.1

title:Ubuntu Security Notice: USN-5338-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-5338-1

Trust: 0.1

title:Ubuntu Security Notice: USN-5278-1: Linux kernel (OEM) vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-5278-1

Trust: 0.1

title:Ubuntu Security Notice: USN-5368-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-5368-1

Trust: 0.1

title:Ubuntu Security Notice: USN-5337-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-5337-1

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.10-2022-009url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2kernel-5.10-2022-009

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1749url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2-2022-1749

Trust: 0.1

title:Debian Security Advisories: DSA-5096-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9382520336267e8dcd400d9d993e932b

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:optee-qemuurl:https://github.com/pjlantz/optee-qemu

Trust: 0.1

sources: VULMON: CVE-2021-44733 // CNNVD: CNNVD-202112-2166

EXTERNAL IDS

db:NVDid:CVE-2021-44733

Trust: 2.4

db:PACKETSTORMid:166397

Trust: 0.7

db:PACKETSTORMid:166708

Trust: 0.7

db:PACKETSTORMid:166636

Trust: 0.7

db:AUSCERTid:ESB-2022.0629

Trust: 0.6

db:AUSCERTid:ESB-2022.1629

Trust: 0.6

db:AUSCERTid:ESB-2022.0987

Trust: 0.6

db:AUSCERTid:ESB-2022.1237

Trust: 0.6

db:AUSCERTid:ESB-2022.0618

Trust: 0.6

db:AUSCERTid:ESB-2022.0611

Trust: 0.6

db:AUSCERTid:ESB-2022.0800

Trust: 0.6

db:CS-HELPid:SB2022032316

Trust: 0.6

db:CS-HELPid:SB2022031403

Trust: 0.6

db:CS-HELPid:SB2021122819

Trust: 0.6

db:CNNVDid:CNNVD-202112-2166

Trust: 0.6

db:VULMONid:CVE-2021-44733

Trust: 0.1

db:PACKETSTORMid:166400

Trust: 0.1

db:PACKETSTORMid:166392

Trust: 0.1

db:PACKETSTORMid:167097

Trust: 0.1

db:PACKETSTORMid:167072

Trust: 0.1

sources: VULMON: CVE-2021-44733 // PACKETSTORM: 166400 // PACKETSTORM: 166397 // PACKETSTORM: 166392 // PACKETSTORM: 166708 // PACKETSTORM: 166636 // PACKETSTORM: 167097 // PACKETSTORM: 167072 // CNNVD: CNNVD-202112-2166 // NVD: CVE-2021-44733

REFERENCES

url:https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/tee/tee_shm.c

Trust: 1.7

url:https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander@linaro.org/

Trust: 1.7

url:https://github.com/pjlantz/optee-qemu/blob/main/readme.md

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20220114-0003/

Trust: 1.7

url:https://www.debian.org/security/2022/dsa-5096

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-44733

Trust: 1.1

url:https://www.cybersecurity-help.cz/vdb/sb2021122819

Trust: 0.6

url:https://packetstormsecurity.com/files/166397/ubuntu-security-notice-usn-5338-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0618

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0629

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1629

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031403

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022032316

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-reuse-after-free-via-tee-shm-get-from-id-37127

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0800

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0987

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0611

Trust: 0.6

url:https://packetstormsecurity.com/files/166636/ubuntu-security-notice-usn-5368-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/166708/ubuntu-security-notice-usn-5377-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1237

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-0435

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-45095

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-0492

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-43976

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-45480

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-4135

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-28711

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-28715

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-4197

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-44733

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0516

Trust: 0.3

url:https://ubuntu.com/security/notices/usn-5339-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0742

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-39685

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-43975

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-23222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-45402

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-39698

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0382

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-0264

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-27666

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1055

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-27820

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-0404

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3743

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-13974

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3759

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-26401

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0001

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1011

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3772

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-37159

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-0404

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-37159

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4002

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3772

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0322

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4002

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-41864

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3773

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4197

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4157

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4037

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4157

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-13974

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3669

Trust: 0.2

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3759

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0002

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3752

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3612

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3764

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4203

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-43976

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3764

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-29154

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3743

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3744

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4083

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3773

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-20322

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-0286

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-20322

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4083

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-41864

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-26401

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-0941

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-3744

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-4037

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-0941

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-42739

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3612

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3669

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-43389

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-4203

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-29154

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-42739

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-27820

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3752

Trust: 0.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://github.com/pjlantz/optee-qemu

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1134.147

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1123.132

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1119.133

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1038.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-173.182

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1124.133

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1090.99

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3506

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1110.113

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1018.20

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1067.72~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1059.62

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1073.76

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1069.73

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1067.72

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1018.20~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1069.73~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5338-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1073.76~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1037.38

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-105.119~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1066.69

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-105.119

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5337-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.13.0-1019.21

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.13.0-37.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.13.0-1022.24

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.13.0-1018.19

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.13/5.13.0-37.42~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.13/5.13.0-1019.21~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.13.0-1021.25

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1032.35

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-45469

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5377-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.13/5.13.0-1021.24~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.13/5.13.0-1025.30~20.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5368-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21781

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1988

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21781

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-4788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-4788

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43056

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1975

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43389

Trust: 0.1

sources: VULMON: CVE-2021-44733 // PACKETSTORM: 166400 // PACKETSTORM: 166397 // PACKETSTORM: 166392 // PACKETSTORM: 166708 // PACKETSTORM: 166636 // PACKETSTORM: 167097 // PACKETSTORM: 167072 // CNNVD: CNNVD-202112-2166 // NVD: CVE-2021-44733

CREDITS

Ubuntu

Trust: 0.5

sources: PACKETSTORM: 166400 // PACKETSTORM: 166397 // PACKETSTORM: 166392 // PACKETSTORM: 166708 // PACKETSTORM: 166636

SOURCES

db:VULMONid:CVE-2021-44733
db:PACKETSTORMid:166400
db:PACKETSTORMid:166397
db:PACKETSTORMid:166392
db:PACKETSTORMid:166708
db:PACKETSTORMid:166636
db:PACKETSTORMid:167097
db:PACKETSTORMid:167072
db:CNNVDid:CNNVD-202112-2166
db:NVDid:CVE-2021-44733

LAST UPDATE DATE

2022-05-13T21:57:14.093000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-44733date:2022-04-01T00:00:00
db:CNNVDid:CNNVD-202112-2166date:2022-04-14T00:00:00
db:NVDid:CVE-2021-44733date:2022-04-01T16:44:00

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-44733date:2021-12-22T00:00:00
db:PACKETSTORMid:166400date:2022-03-22T15:35:42
db:PACKETSTORMid:166397date:2022-03-22T15:31:06
db:PACKETSTORMid:166392date:2022-03-22T15:16:20
db:PACKETSTORMid:166708date:2022-04-13T15:02:44
db:PACKETSTORMid:166636date:2022-04-07T16:37:07
db:PACKETSTORMid:167097date:2022-05-11T16:54:36
db:PACKETSTORMid:167072date:2022-05-11T16:37:26
db:CNNVDid:CNNVD-202112-2166date:2021-12-22T00:00:00
db:NVDid:CVE-2021-44733date:2021-12-22T17:15:00