ID

VAR-202207-1358


CVE

CVE-2021-33656


TITLE

Linux Kernel  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211

DESCRIPTION

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds. Linux Kernel Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. ========================================================================== Ubuntu Security Notice USN-5650-1 September 30, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33656) Christian Brauner discovered that the XFS file system implementation in the Linux kernel did not properly handle setgid file creation. A local attacker could use this to gain elevated privileges. (CVE-2021-4037) It was discovered that the ext4 file system implementation in the Linux kernel did not properly initialize memory in some situations. A privileged local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0850) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A remote attacker could use this to expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2639) Jann Horn discovered that the ASIX AX88179/178A USB Ethernet driver in the Linux kernel contained multiple out-of-bounds vulnerabilities. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2964) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Journaled File System (JFS) in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3202) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1114-kvm 4.4.0-1114.124 linux-image-4.4.0-1151-aws 4.4.0-1151.166 linux-image-4.4.0-234-generic 4.4.0-234.268 linux-image-4.4.0-234-lowlatency 4.4.0-234.268 linux-image-aws 4.4.0.1151.155 linux-image-generic 4.4.0.234.240 linux-image-kvm 4.4.0.1114.111 linux-image-lowlatency 4.4.0.234.240 linux-image-virtual 4.4.0.234.240 Ubuntu 14.04 ESM: linux-image-4.4.0-1113-aws 4.4.0-1113.119 linux-image-4.4.0-234-generic 4.4.0-234.268~14.04.1 linux-image-4.4.0-234-lowlatency 4.4.0-234.268~14.04.1 linux-image-aws 4.4.0.1113.110 linux-image-generic-lts-xenial 4.4.0.234.203 linux-image-lowlatency-lts-xenial 4.4.0.234.203 linux-image-virtual-lts-xenial 4.4.0.234.203 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5650-1 CVE-2021-33655, CVE-2021-33656, CVE-2021-4037, CVE-2022-0850, CVE-2022-1199, CVE-2022-1204, CVE-2022-1729, CVE-2022-20368, CVE-2022-2639, CVE-2022-2964, CVE-2022-2978, CVE-2022-3028, CVE-2022-3202, CVE-2022-36946 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Critical: Red Hat Advanced Cluster Management 2.6.6 security fixes and container updates Advisory ID: RHSA-2023:3326-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2023:3326 Issue date: 2023-05-25 CVE Names: CVE-2021-26341 CVE-2021-33655 CVE-2021-33656 CVE-2022-1462 CVE-2022-1679 CVE-2022-1789 CVE-2022-2196 CVE-2022-2663 CVE-2022-3028 CVE-2022-3239 CVE-2022-3522 CVE-2022-3524 CVE-2022-3564 CVE-2022-3566 CVE-2022-3567 CVE-2022-3619 CVE-2022-3623 CVE-2022-3625 CVE-2022-3627 CVE-2022-3628 CVE-2022-3707 CVE-2022-3970 CVE-2022-4129 CVE-2022-20141 CVE-2022-25265 CVE-2022-30594 CVE-2022-35252 CVE-2022-36227 CVE-2022-39188 CVE-2022-39189 CVE-2022-41218 CVE-2022-41674 CVE-2022-42703 CVE-2022-42720 CVE-2022-42721 CVE-2022-42722 CVE-2022-43552 CVE-2022-43750 CVE-2022-47929 CVE-2023-0361 CVE-2023-0394 CVE-2023-0461 CVE-2023-1195 CVE-2023-1582 CVE-2023-1999 CVE-2023-22490 CVE-2023-23454 CVE-2023-23946 CVE-2023-25652 CVE-2023-25815 CVE-2023-27535 CVE-2023-28856 CVE-2023-29007 CVE-2023-32313 CVE-2023-32314 ===================================================================== 1. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.6.6 General Availability release images, which fix security issues and update container images. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat Advanced Cluster Management for Kubernetes 2.6.6 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/ Security Fix(es): * CVE-2023-28856 redis: Insufficient validation of HINCRBYFLOAT command * CVE-2023-32314 vm2: Sandbox Escape * CVE-2023-32313 vm2: Inspect Manipulation 3. Solution: For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation for details on how to install the images: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/install/installing#installing-while-connected-online 4. Bugs fixed (https://bugzilla.redhat.com/): 2187525 - CVE-2023-28856 redis: Insufficient validation of HINCRBYFLOAT command 2208376 - CVE-2023-32314 vm2: Sandbox Escape 2208377 - CVE-2023-32313 vm2: Inspect Manipulation 5. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZHBqdtzjgjWX9erEAQgPBBAAnba1fjcWKh24XoIxjEsRwYwq2JN7qmIU MANW+FQiQX2SxrlS729OKswdcDQbMeGr2S9bnmZutqTTihgS/0DnCEUV4leX2fec iX3+umTRrS4S2n1bs6jhMTygTHNFMEm0hRlaif0T35YnLtFDUO82QQVMAuifh0kn 5Z8n3oHiu5KX8oHQueP2zk9jC1DP2LWcxPZq3X90kYPTYn1bv12N8EcmaiIsQI2L I5vXMPLf/SSl22Fzgs/qvFrdpRzwuWl4OATWjdICIZZg4hVrxG/k4pekuPX1QsTE 7sFOBsDp6i9RW/ZgUG30BI7RI5TZv1x087SI9j5M4PL06ePnYzBeWOPmkD5XeclV ScJvCcVQpI4gef0QrsRcfaMaVdYgJa4S6rn0RJddaXY1FsyhDU/61LjEpI/Mu5LC GKchpJC+lUGhGWy7r5Nn563VuUwdjKqjvtBdU4UwB/K6GoLF4QYMWOcBlZUBxNfD JLVIVj5FgQYNMcV/0KFsL51rlbeTCntp4xH5QbPxt+932E0FlSej5Y1dqTBNX78a w0hkqQoBDqjfYK80yvyeRI5X3ZQ4SHJe61ozHVSLa+VhGz5WDrPaHNsFkPM01EsV pUhn2d27SA+SRwPE93GG6smk1dHgx6grZCISvRbtqzItoXcDdEb5L94GZx0pIFiF nh/78SLF0ZU= =P0X2 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.52

sources: NVD: CVE-2021-33656 // JVNDB: JVNDB-2021-020211 // VULHUB: VHN-393734 // PACKETSTORM: 168264 // PACKETSTORM: 168203 // PACKETSTORM: 168236 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 168589 // PACKETSTORM: 172587 // PACKETSTORM: 172703

AFFECTED PRODUCTS

vendor:huaweimodel:openeulerscope:eqversion:20.03

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.127

Trust: 1.0

vendor:huaweimodel:openeulerscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211 // NVD: CVE-2021-33656

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33656
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-33656
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2021-33656
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-33656
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211 // NVD: CVE-2021-33656

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-393734 // JVNDB: JVNDB-2021-020211 // NVD: CVE-2021-33656

THREAT TYPE

local

Trust: 0.7

sources: PACKETSTORM: 168264 // PACKETSTORM: 168203 // PACKETSTORM: 168236 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 168589

TYPE

arbitrary

Trust: 0.7

sources: PACKETSTORM: 168264 // PACKETSTORM: 168203 // PACKETSTORM: 168236 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 168589

PATCH

title:drop old FONT ioctlsurl:https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211

EXTERNAL IDS

db:NVDid:CVE-2021-33656

Trust: 3.6

db:OPENWALLid:OSS-SECURITY/2022/07/19/3

Trust: 1.9

db:JVNDBid:JVNDB-2021-020211

Trust: 0.8

db:PACKETSTORMid:168253

Trust: 0.2

db:PACKETSTORMid:168264

Trust: 0.2

db:PACKETSTORMid:168324

Trust: 0.2

db:PACKETSTORMid:168203

Trust: 0.2

db:PACKETSTORMid:168236

Trust: 0.2

db:PACKETSTORMid:168589

Trust: 0.2

db:PACKETSTORMid:168238

Trust: 0.2

db:PACKETSTORMid:168251

Trust: 0.1

db:PACKETSTORMid:168263

Trust: 0.1

db:PACKETSTORMid:168177

Trust: 0.1

db:PACKETSTORMid:168221

Trust: 0.1

db:PACKETSTORMid:168237

Trust: 0.1

db:PACKETSTORMid:168335

Trust: 0.1

db:PACKETSTORMid:168261

Trust: 0.1

db:VULHUBid:VHN-393734

Trust: 0.1

db:PACKETSTORMid:172587

Trust: 0.1

db:PACKETSTORMid:172703

Trust: 0.1

sources: VULHUB: VHN-393734 // JVNDB: JVNDB-2021-020211 // PACKETSTORM: 168264 // PACKETSTORM: 168203 // PACKETSTORM: 168236 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 168589 // PACKETSTORM: 172587 // PACKETSTORM: 172703 // NVD: CVE-2021-33656

REFERENCES

url:http://www.openwall.com/lists/oss-security/2022/07/19/3

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2021-33656

Trust: 1.7

url:https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html

Trust: 1.1

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&packagename=kernel

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-33061

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-3028

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33655

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-3619

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41674

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42721

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-30594

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2196

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3625

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-43750

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-30594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-4129

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41218

Trust: 0.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-26341

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3239

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-25815

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42722

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1679

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2663

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3707

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1582

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1462

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-22490

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-20141

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-32314

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-47929

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39188

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2663

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-32313

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3623

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1999

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-26341

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3566

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1789

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3627

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-27535

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1789

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-20141

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2196

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-23454

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25265

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3524

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39189

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3970

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3028

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3567

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33656

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0394

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0461

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-25652

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33655

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3628

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-36227

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3564

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1195

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42720

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-23946

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42703

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25265

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3522

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-29007

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1462

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1679

Trust: 0.2

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&amp;packagename=kernel

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5597-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1069.79

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-125.141

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5589-1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5591-2

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5591-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1087.95~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1045.50

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1082.90

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1090.95

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1084.91

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1032.36

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1052.55

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1032.36~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1074.79

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1087.95

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5592-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1081.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1082.90~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1069.79~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5603-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1084.91~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5595-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1090.95~18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-20368

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5650-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2639

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-36946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3202

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3239

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3522

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0361

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-28856

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43552

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-35252

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3326

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/install/installing#installing-while-connected-online

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2795

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3204

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41973

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3356

Trust: 0.1

sources: VULHUB: VHN-393734 // JVNDB: JVNDB-2021-020211 // PACKETSTORM: 168264 // PACKETSTORM: 168203 // PACKETSTORM: 168236 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 168589 // PACKETSTORM: 172587 // PACKETSTORM: 172703 // NVD: CVE-2021-33656

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 168264 // PACKETSTORM: 168203 // PACKETSTORM: 168236 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 168589

SOURCES

db:VULHUBid:VHN-393734
db:JVNDBid:JVNDB-2021-020211
db:PACKETSTORMid:168264
db:PACKETSTORMid:168203
db:PACKETSTORMid:168236
db:PACKETSTORMid:168238
db:PACKETSTORMid:168324
db:PACKETSTORMid:168253
db:PACKETSTORMid:168589
db:PACKETSTORMid:172587
db:PACKETSTORMid:172703
db:NVDid:CVE-2021-33656

LAST UPDATE DATE

2024-12-21T22:49:01.713000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-393734date:2022-10-29T00:00:00
db:JVNDBid:JVNDB-2021-020211date:2023-09-28T03:25:00
db:NVDid:CVE-2021-33656date:2022-10-29T02:52:00.693

SOURCES RELEASE DATE

db:VULHUBid:VHN-393734date:2022-07-18T00:00:00
db:JVNDBid:JVNDB-2021-020211date:2023-09-28T00:00:00
db:PACKETSTORMid:168264date:2022-09-06T16:26:11
db:PACKETSTORMid:168203date:2022-08-31T16:43:40
db:PACKETSTORMid:168236date:2022-09-02T15:20:53
db:PACKETSTORMid:168238date:2022-09-02T15:21:29
db:PACKETSTORMid:168324date:2022-09-09T15:56:54
db:PACKETSTORMid:168253date:2022-09-05T15:09:08
db:PACKETSTORMid:168589date:2022-10-01T15:15:13
db:PACKETSTORMid:172587date:2023-05-26T14:34:05
db:PACKETSTORMid:172703date:2023-06-05T17:11:53
db:NVDid:CVE-2021-33656date:2022-07-18T15:15:08.043