ID

VAR-202207-1358


CVE

CVE-2021-33656


TITLE

Linux Kernel  Out-of-bounds write vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211

DESCRIPTION

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds. Linux Kernel Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2023:2736-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:2736 Issue date: 2023-05-16 CVE Names: CVE-2021-26341 CVE-2021-33655 CVE-2021-33656 CVE-2022-1462 CVE-2022-1679 CVE-2022-1789 CVE-2022-2196 CVE-2022-2663 CVE-2022-3028 CVE-2022-3239 CVE-2022-3522 CVE-2022-3524 CVE-2022-3564 CVE-2022-3566 CVE-2022-3567 CVE-2022-3619 CVE-2022-3623 CVE-2022-3625 CVE-2022-3628 CVE-2022-3707 CVE-2022-4129 CVE-2022-20141 CVE-2022-25265 CVE-2022-30594 CVE-2022-39188 CVE-2022-39189 CVE-2022-41218 CVE-2022-41674 CVE-2022-42703 CVE-2022-42720 CVE-2022-42721 CVE-2022-42722 CVE-2022-43750 CVE-2022-47929 CVE-2023-0394 CVE-2023-0461 CVE-2023-1195 CVE-2023-1582 CVE-2023-23454 ==================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux NFV (v. 8) - x86_64 Red Hat Enterprise Linux RT (v. 8) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461) * hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341) * malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655) * when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656) * possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462) * use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679) * KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789) * KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196) * netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663) * race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028) * media: em28xx: initialize refcount before kref_get (CVE-2022-3239) * race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522) * memory leak in ipv6_renew_options() (CVE-2022-3524) * data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566) * data races around sk->sk_prot (CVE-2022-3567) * memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619) * denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623) * use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625) * USB-accessible buffer overflow in brcmfmac (CVE-2022-3628) * Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707) * l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129) * igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141) * Executable Space Protection Bypass (CVE-2022-25265) * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) * unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188) * TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189) * Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218) * u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674) * use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) * use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720) * BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721) * Denial of service in beacon protection for P2P-device (CVE-2022-42722) * memory corruption in usbmon driver (CVE-2022-43750) * NULL pointer dereference in traffic control subsystem (CVE-2022-47929) * NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394) * use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195) * Soft lockup occurred during __page_mapcount (CVE-2023-1582) * slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2055499 - CVE-2022-25265 kernel: Executable Space Protection Bypass 2061703 - CVE-2021-26341 hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch 2078466 - CVE-2022-1462 kernel: possible race condition in drivers/tty/tty_buffers.c 2084125 - CVE-2022-1679 kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges 2085300 - CVE-2022-30594 kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option 2090723 - CVE-2022-1789 kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva 2108691 - CVE-2021-33655 kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory 2108696 - CVE-2021-33656 kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds 2114937 - CVE-2022-20141 kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets 2122228 - CVE-2022-3028 kernel: race condition in xfrm_probe_algs can lead to OOB read/write 2122960 - CVE-2022-41218 kernel: Report vmalloc UAF in dvb-core/dmxdev 2123056 - CVE-2022-2663 kernel: netfilter: nf_conntrack_irc message handling issue 2124788 - CVE-2022-39189 kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning 2127985 - CVE-2022-3239 kernel: media: em28xx: initialize refcount before kref_get 2130141 - CVE-2022-39188 kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry 2133483 - CVE-2022-42703 kernel: use-after-free related to leaf anon_vma double reuse 2134377 - CVE-2022-41674 kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() 2134451 - CVE-2022-42720 kernel: use-after-free in bss_ref_get in net/wireless/scan.c 2134506 - CVE-2022-42721 kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c 2134517 - CVE-2022-42722 kernel: Denial of service in beacon protection for P2P-device 2134528 - CVE-2022-4129 kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference 2137979 - CVE-2022-3707 kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed 2143893 - CVE-2022-3566 kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt 2143943 - CVE-2022-3567 kernel: data races around sk->sk_prot 2144720 - CVE-2022-3625 kernel: use-after-free after failed devlink reload in devlink_param_get 2150947 - CVE-2022-3524 kernel: memory leak in ipv6_renew_options() 2150960 - CVE-2022-3628 kernel: USB-accessible buffer overflow in brcmfmac 2150979 - CVE-2022-3522 kernel: race condition in hugetlb_no_page() in mm/hugetlb.c 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c 2151270 - CVE-2022-43750 kernel: memory corruption in usbmon driver 2154171 - CVE-2023-1195 kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c 2154235 - CVE-2022-3619 kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c 2160023 - CVE-2022-2196 kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks 2162120 - CVE-2023-0394 kernel: NULL pointer dereference in rawv6_push_pending_frames 2165721 - CVE-2022-3623 kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry 2168246 - CVE-2022-47929 kernel: NULL pointer dereference in traffic control subsystem 2168297 - CVE-2023-23454 kernel: slab-out-of-bounds read vulnerabilities in cbq_classify 2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets 2180936 - CVE-2023-1582 kernel: Soft lockup occurred during __page_mapcount 6. Package List: Red Hat Enterprise Linux NFV (v. 8): Source: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.src.rpm x86_64: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-kvm-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-kvm-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm Red Hat Enterprise Linux RT (v. 8): Source: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.src.rpm x86_64: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZGNu2tzjgjWX9erEAQh93A/9F2L57OgQtbqD3gy1RyYVyiSnovPSukbF MXVqHkJHDfKqynLRrFqm8FztET3BNsDC+tTmyMSDHxiZo4IF2x0ldkbi1sJ9YTx/ RdnlHnIFcmv7ubu628ATv/LvhOwCzVVw52pAJHJFQPiPEa29hGDC8aBk/YQBigXH PqYyMMfeEocvsFkMjf22FZ4t2CN6ktUQh38goKgYbN/wqYhjwHsXtlYTw51SW5+v TXaLFtH7VrARlC2YtzTrQZ+mvnLdutapSZJudb9lPPDTEeQGXxaqnzjgjPEUYl3y wM480wj5NxB+taVlnZGJh1Uwy75sISoWL/b7wyQH8OHqOyZ3pY8dcYE2scbkDlPx 1hA8PqpwHSyp7nFpPBSfYXtgrAMeLSsYRVyptTLwgRr28L29mFnfjd4PE0oL+hZV igKd6NbyVWbJ0Z7JnI305ghqp/SMr6t5nX5TRWpgOysPbWQH+mwnlf+xa72hyaCb cgmeDa1s28jCZeIREQoW8uVk4HGKhyqr/EQ66VCXaXJhF8m7qXoVPMCpE7gr0GPA WQ5N5haLNJQiPKFfaucuVGIS9syifMHs9nTeFLfCBXjKca4xBi/pWysj+XntceLH y+SBHI/AQPzBbN+uMCezkfvndP+Rbo/dTgAUwlVe61wwNmZUBBSP1FwyJUoeH2AH pumjkxlxpLs=ytDn -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Logging Subsystem 5.7.2 - Red Hat OpenShift Security Fix(es): * net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723) * rubygem-rack: denial of service in header parsing (CVE-2023-27539) * rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice (CVE-2023-28120) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding 2179637 - CVE-2023-28120 rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice 2179649 - CVE-2023-27539 rubygem-rack: denial of service in header parsing 5. JIRA issues fixed (https://issues.redhat.com/): LOG-3314 - [fluentd] The passphrase can not be enabled when forwarding logs to Kafka LOG-3316 - openshift-logging namespace can not be deleted directly when use lokistack as default store. LOG-3330 - run.sh shows incorrect chunk_limit_size if changed. LOG-3445 - [vector to loki] validation is not disabled when tls.insecureSkipVerify=true LOG-3749 - Unability to configure nodePlacement and toleration for logging-view-plugin LOG-3784 - [fluentd http] the defaut value HTTP content type application/x-ndjson is unsupported on datadog LOG-3827 - [fluentd http] The passphase isn't generated in fluent.conf LOG-3878 - [vector] PHP multiline errors are collected line by line when detectMultilineErrors is enabled. LOG-3945 - [Vector] Collector pods in CrashLoopBackOff when ClusterLogForwarder pipeline has space in between the pipeline name. LOG-3997 - Add http to log_forwarder_output_info metrics LOG-4011 - [Vector] Collector not complying with the custom tlsSecurityProfile configuration. LOG-4019 - [release-5.7] fluentd multiline exception plugin fails to detect JS client exception LOG-4049 - [release-5.7] User can list labels and label values for all user workload namespaces via Loki Label APIs LOG-4052 - [release-5.7] Fix Loki timeouts querying logs from OCP Console LOG-4098 - [release-5.7] No log_forwarder_output_info for splunk and google logging LOG-4151 - Fluentd fix missing nil check for rotated_tw in update_watcher LOG-4163 - [release-5.7] TLS configuration for multiple Kafka brokers is not created in Vector LOG-4185 - Resources, tolerations and nodeSelector for the collector are missing LOG-4218 - Vector fails to run when configuring syslog forwarding for audit log LOG-4219 - Vector handles journal log as container log when enabling syslog forwarding. It breaks the compatibility with Fluentd LOG-4220 - [RHOCP4.11] Logs of POD which doesn't have labels specified by structuredTypeKey are parsed to JSON, and forwarded to app-xxxxxx LOG-4221 - [release-5.7] Fluentd wrongly closes a log file due to hash collision 6. Bug Fix(es): * Simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184103) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208286) * Low memory deadlock with md devices and external (imsm) metadata handling - - requires a kernfs notification backport (BZ#2208542) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2211663) * Marvell 8.7 Bug qedi shutdown handler hangs upon reboot (BZ#2215334) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216499) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216770) * OCS 4.8 cephfs kernel crash : mds_dispatch ceph_handle_snap unable to handle kernel NULL (BZ#2218273) * FJ8.6 Bug: System panic occurs because the list used by i40e driver is corrupted (BZ#2219262) * st_gmac tx-checksum offload on vlan is not consistent with st_gmac interface (BZ#2219908) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220811) * refcount_t overflow often happens in mem_cgroup_id_get_online() (BZ#2221011) * Scheduler update (rhel8.8) (BZ#2221304) * RHEL8.6 boot panic with message "kernel BUG at lib/list_debug.c:28!" (BZ#2222247) * Enable conntrack clash resolution for GRE (BZ#2223543) * Intel 8.8 BUG SPR perf: Workaround the UPI intel_uncore_has_discovery_tables issue on SPR MCC and LCC (BZ#2225514) * KVM: x86: fix sending PV IPI (BZ#2226580) * libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227074) Enhancement(s): * Mellanox 8.7 FEAT mlx5: It's possible to enable LRO when XDP is active (BZ#2165585) * Export symbol pci_find_host_bridge (BZ#2225335) 4. ========================================================================== Ubuntu Security Notice USN-5650-1 September 30, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33656) Christian Brauner discovered that the XFS file system implementation in the Linux kernel did not properly handle setgid file creation. A local attacker could use this to gain elevated privileges. (CVE-2021-4037) It was discovered that the ext4 file system implementation in the Linux kernel did not properly initialize memory in some situations. A privileged local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0850) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A remote attacker could use this to expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2639) Jann Horn discovered that the ASIX AX88179/178A USB Ethernet driver in the Linux kernel contained multiple out-of-bounds vulnerabilities. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2964) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Journaled File System (JFS) in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3202) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1114-kvm 4.4.0-1114.124 linux-image-4.4.0-1151-aws 4.4.0-1151.166 linux-image-4.4.0-234-generic 4.4.0-234.268 linux-image-4.4.0-234-lowlatency 4.4.0-234.268 linux-image-aws 4.4.0.1151.155 linux-image-generic 4.4.0.234.240 linux-image-kvm 4.4.0.1114.111 linux-image-lowlatency 4.4.0.234.240 linux-image-virtual 4.4.0.234.240 Ubuntu 14.04 ESM: linux-image-4.4.0-1113-aws 4.4.0-1113.119 linux-image-4.4.0-234-generic 4.4.0-234.268~14.04.1 linux-image-4.4.0-234-lowlatency 4.4.0-234.268~14.04.1 linux-image-aws 4.4.0.1113.110 linux-image-generic-lts-xenial 4.4.0.234.203 linux-image-lowlatency-lts-xenial 4.4.0.234.203 linux-image-virtual-lts-xenial 4.4.0.234.203 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5650-1 CVE-2021-33655, CVE-2021-33656, CVE-2021-4037, CVE-2022-0850, CVE-2022-1199, CVE-2022-1204, CVE-2022-1729, CVE-2022-20368, CVE-2022-2639, CVE-2022-2964, CVE-2022-2978, CVE-2022-3028, CVE-2022-3202, CVE-2022-36946

Trust: 2.52

sources: NVD: CVE-2021-33656 // JVNDB: JVNDB-2021-020211 // VULHUB: VHN-393734 // VULMON: CVE-2021-33656 // PACKETSTORM: 168263 // PACKETSTORM: 168261 // PACKETSTORM: 172336 // PACKETSTORM: 172895 // PACKETSTORM: 174369 // PACKETSTORM: 168253 // PACKETSTORM: 168251 // PACKETSTORM: 168589

AFFECTED PRODUCTS

vendor:huaweimodel:openeulerscope:eqversion:20.03

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.127

Trust: 1.0

vendor:huaweimodel:openeulerscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211 // NVD: CVE-2021-33656

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33656
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-33656
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2021-33656
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-33656
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211 // NVD: CVE-2021-33656

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-393734 // JVNDB: JVNDB-2021-020211 // NVD: CVE-2021-33656

THREAT TYPE

local

Trust: 0.5

sources: PACKETSTORM: 168263 // PACKETSTORM: 168261 // PACKETSTORM: 168253 // PACKETSTORM: 168251 // PACKETSTORM: 168589

TYPE

arbitrary

Trust: 0.5

sources: PACKETSTORM: 168263 // PACKETSTORM: 168261 // PACKETSTORM: 168253 // PACKETSTORM: 168251 // PACKETSTORM: 168589

PATCH

title:drop old FONT ioctlsurl:https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html

Trust: 0.8

sources: JVNDB: JVNDB-2021-020211

EXTERNAL IDS

db:NVDid:CVE-2021-33656

Trust: 3.6

db:OPENWALLid:OSS-SECURITY/2022/07/19/3

Trust: 2.0

db:JVNDBid:JVNDB-2021-020211

Trust: 0.8

db:PACKETSTORMid:168251

Trust: 0.2

db:PACKETSTORMid:168263

Trust: 0.2

db:PACKETSTORMid:168253

Trust: 0.2

db:PACKETSTORMid:168589

Trust: 0.2

db:PACKETSTORMid:168261

Trust: 0.2

db:PACKETSTORMid:168264

Trust: 0.1

db:PACKETSTORMid:168177

Trust: 0.1

db:PACKETSTORMid:168324

Trust: 0.1

db:PACKETSTORMid:168203

Trust: 0.1

db:PACKETSTORMid:168221

Trust: 0.1

db:PACKETSTORMid:168237

Trust: 0.1

db:PACKETSTORMid:168236

Trust: 0.1

db:PACKETSTORMid:168335

Trust: 0.1

db:PACKETSTORMid:168238

Trust: 0.1

db:VULHUBid:VHN-393734

Trust: 0.1

db:VULMONid:CVE-2021-33656

Trust: 0.1

db:PACKETSTORMid:172336

Trust: 0.1

db:PACKETSTORMid:172895

Trust: 0.1

db:PACKETSTORMid:174369

Trust: 0.1

sources: VULHUB: VHN-393734 // VULMON: CVE-2021-33656 // JVNDB: JVNDB-2021-020211 // PACKETSTORM: 168263 // PACKETSTORM: 168261 // PACKETSTORM: 172336 // PACKETSTORM: 172895 // PACKETSTORM: 174369 // PACKETSTORM: 168253 // PACKETSTORM: 168251 // PACKETSTORM: 168589 // NVD: CVE-2021-33656

REFERENCES

url:http://www.openwall.com/lists/oss-security/2022/07/19/3

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-33656

Trust: 1.6

url:https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html

Trust: 1.1

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&packagename=kernel

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3028

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33655

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2021-33656

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33061

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-3239

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25265

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-47929

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42703

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-4129

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3567

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-43750

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2196

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3566

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42720

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-20141

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3564

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3239

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3628

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1789

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25265

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2196

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41218

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-26341

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1679

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1789

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39188

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0461

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42721

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1195

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1582

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-30594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2663

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3623

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3619

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3028

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3707

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-20141

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42722

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3522

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3524

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1462

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1679

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-26341

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39189

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41674

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0394

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-30594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3625

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1462

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2663

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33655

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-23454

Trust: 0.2

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&amp;packagename=kernel

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5600-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-125.141~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1105.116

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5598-1

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3522

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-28120

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3495

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27539

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29007

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41723

Trust: 0.1

url:https://issues.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25815

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-36227

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22490

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2491

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1829

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-35788

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4789

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1637

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1637

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42896

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2124

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-28466

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-35788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28466

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-3390

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20593

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1829

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-20593

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2124

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1084.91~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5595-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1090.95~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5591-4

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5591-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1140.151

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-20368

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5650-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2639

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-36946

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3202

Trust: 0.1

sources: VULHUB: VHN-393734 // VULMON: CVE-2021-33656 // JVNDB: JVNDB-2021-020211 // PACKETSTORM: 168263 // PACKETSTORM: 168261 // PACKETSTORM: 172336 // PACKETSTORM: 172895 // PACKETSTORM: 174369 // PACKETSTORM: 168253 // PACKETSTORM: 168251 // PACKETSTORM: 168589 // NVD: CVE-2021-33656

CREDITS

Ubuntu

Trust: 0.5

sources: PACKETSTORM: 168263 // PACKETSTORM: 168261 // PACKETSTORM: 168253 // PACKETSTORM: 168251 // PACKETSTORM: 168589

SOURCES

db:VULHUBid:VHN-393734
db:VULMONid:CVE-2021-33656
db:JVNDBid:JVNDB-2021-020211
db:PACKETSTORMid:168263
db:PACKETSTORMid:168261
db:PACKETSTORMid:172336
db:PACKETSTORMid:172895
db:PACKETSTORMid:174369
db:PACKETSTORMid:168253
db:PACKETSTORMid:168251
db:PACKETSTORMid:168589
db:NVDid:CVE-2021-33656

LAST UPDATE DATE

2024-09-17T21:08:44.510000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-393734date:2022-10-29T00:00:00
db:VULMONid:CVE-2021-33656date:2022-07-19T00:00:00
db:JVNDBid:JVNDB-2021-020211date:2023-09-28T03:25:00
db:NVDid:CVE-2021-33656date:2022-10-29T02:52:00.693

SOURCES RELEASE DATE

db:VULHUBid:VHN-393734date:2022-07-18T00:00:00
db:VULMONid:CVE-2021-33656date:2022-07-18T00:00:00
db:JVNDBid:JVNDB-2021-020211date:2023-09-28T00:00:00
db:PACKETSTORMid:168263date:2022-09-06T16:25:57
db:PACKETSTORMid:168261date:2022-09-06T16:25:28
db:PACKETSTORMid:172336date:2023-05-16T17:04:05
db:PACKETSTORMid:172895date:2023-06-13T21:26:17
db:PACKETSTORMid:174369date:2023-08-29T16:27:47
db:PACKETSTORMid:168253date:2022-09-05T15:09:08
db:PACKETSTORMid:168251date:2022-09-05T15:08:18
db:PACKETSTORMid:168589date:2022-10-01T15:15:13
db:NVDid:CVE-2021-33656date:2022-07-18T15:15:08.043