var-202105-1451
Vulnerability from variot
An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux® distribution that tries to keep it simple. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security update Advisory ID: RHSA-2021:3812-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3812 Issue date: 2021-10-12 CVE Names: CVE-2021-3653 CVE-2021-3656 CVE-2021-22543 CVE-2021-22555 CVE-2021-37576 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.6) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.6) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.6) - noarch, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Package List:
Red Hat Enterprise Linux Server AUS (v. 7.6):
Source: kernel-3.10.0-957.84.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-957.84.1.el7.noarch.rpm kernel-doc-3.10.0-957.84.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-957.84.1.el7.x86_64.rpm kernel-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm kernel-devel-3.10.0-957.84.1.el7.x86_64.rpm kernel-headers-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.84.1.el7.x86_64.rpm perf-3.10.0-957.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm python-perf-3.10.0-957.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.6):
Source: kernel-3.10.0-957.84.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-957.84.1.el7.noarch.rpm kernel-doc-3.10.0-957.84.1.el7.noarch.rpm
ppc64le: kernel-3.10.0-957.84.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.84.1.el7.ppc64le.rpm kernel-debug-3.10.0-957.84.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.84.1.el7.ppc64le.rpm kernel-devel-3.10.0-957.84.1.el7.ppc64le.rpm kernel-headers-3.10.0-957.84.1.el7.ppc64le.rpm kernel-tools-3.10.0-957.84.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.84.1.el7.ppc64le.rpm perf-3.10.0-957.84.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm python-perf-3.10.0-957.84.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm
x86_64: kernel-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm kernel-devel-3.10.0-957.84.1.el7.x86_64.rpm kernel-headers-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.84.1.el7.x86_64.rpm perf-3.10.0-957.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm python-perf-3.10.0-957.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.6):
Source: kernel-3.10.0-957.84.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-957.84.1.el7.noarch.rpm kernel-doc-3.10.0-957.84.1.el7.noarch.rpm
x86_64: bpftool-3.10.0-957.84.1.el7.x86_64.rpm kernel-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm kernel-devel-3.10.0-957.84.1.el7.x86_64.rpm kernel-headers-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.84.1.el7.x86_64.rpm perf-3.10.0-957.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm python-perf-3.10.0-957.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 7.6):
x86_64: kernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional E4S (v. 7.6):
ppc64le: kernel-debug-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.84.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.84.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.84.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 7.6):
x86_64: kernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.84.1.el7.x86_64.rpm perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2021-3653 https://access.redhat.com/security/cve/CVE-2021-3656 https://access.redhat.com/security/cve/CVE-2021-22543 https://access.redhat.com/security/cve/CVE-2021-22555 https://access.redhat.com/security/cve/CVE-2021-37576 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYWWkrNzjgjWX9erEAQgeVg//eBUd0HQYAc3u6Nc1nBOOBM+SWHAI6rwT SWbLidMennvaCylOWpdL23fkpPkhCRyj5fbXen2dQGtUop2sEm6nmVLFW6cQO8Yv rfXN3wnrW8P0Ah3QtWeV1O22ah8WzcgeML96xyUl3K7yJSY+evXYYBUM7Q8nbzW1 0K7VJm79SxRsszcNq3R/mG5MuPJV+cSnSlG+1cqK+A+YRVKDIE/7vWiTS1z9GDlY /DIlKzvEcsyaOFnKYg+RQRQ5HCB5Hp2JNjRrz5F+X+KJRoT6KTDlbFY/a34FjYWA fUN3pA0aQtdGgQsAB6+T+pVGTYq0vRWPOXhnN2OaN7a95OwbVC9DmiQXwjLQnn2C rvU52ExQP6Jf+WfNHo7yfFMgR1Eyihkc+/zf0qPQomuEqMjEfqyMXOoPsCoXotGs OBJEVIYvBmA7CYif9L0cQRNJyTFfv1IcXKgP2UgrGdChQnLBz/ijVUU17HcU783R G6hXh2+Ojllbt5/rf2PQfFZYjswIVuGe9/You+T6qQXJ+zInz1GOi92+Vwv+gEGF KNLqZJ1nvB1xOm60noCBhnke5vPbzFA+YNGSJnc0tLxZ6Dek891Qb1Eq1f+rwR/9 wfCEgECYLoGvlc2RXC12m13BLUTL+VjVyc0KmG/O9vjFD42EzeFo8rpuXjVsF7QJ S627544rR1c=4NQZ -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description:
Red Hat Advanced Cluster Management for Kubernetes 2.3.3 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
Security fixes:
-
nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
-
redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
-
redis: Integer overflow issue with Streams (CVE-2021-32627)
-
redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
-
redis: Integer overflow issue with intsets (CVE-2021-32687)
-
redis: Integer overflow issue with strings (CVE-2021-41099)
-
redis: Out of bounds read in lua debugger protocol parser (CVE-2021-32672)
-
redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
-
helm: information disclosure vulnerability (CVE-2021-32690)
Bug fixes:
-
KUBE-API: Support move agent to different cluster in the same namespace (BZ# 1977358)
-
Add columns to the Agent CRD list (BZ# 1977398)
-
ClusterDeployment controller watches all Secrets from all namespaces (BZ# 1986081)
-
RHACM 2.3.3 images (BZ# 1999365)
-
Workaround for Network Manager not supporting nmconnections priority (BZ# 2001294)
-
create cluster page empty in Safary Browser (BZ# 2002280)
-
Compliance state doesn't get updated after fixing the issue causing initially the policy not being able to update the managed object (BZ# 2002667)
-
Overview page displays VMware based managed cluster as other (BZ# 2004188)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name 1977358 - [4.8.0] KUBE-API: Support move agent to different cluster in the same namespace 1977398 - [4.8.0] [master] Add columns to the Agent CRD list 1978144 - CVE-2021-32690 helm: information disclosure vulnerability 1986081 - [4.8.0] ClusterDeployment controller watches all Secrets from all namespaces 1999365 - RHACM 2.3.3 images 2001294 - [4.8.0] Workaround for Network Manager not supporting nmconnections priority 2002280 - create cluster page empty in Safary Browser 2002667 - Compliance state doesn't get updated after fixing the issue causing initially the policy not being able to update the managed object 2004188 - Overview page displays VMware based managed cluster as other 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request 2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings
- These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Bug Fix(es):
- Rebase package(s) to version: 1.2.23
Highlights, important fixes, or notable enhancements:
-
imgbase should not copy the selinux binary policy file (BZ# 1979624) (BZ#1989397)
-
RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. (BZ#1975177)
-
8) - aarch64, noarch, ppc64le, s390x, x86_64
Bug Fix(es):
-
Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)
-
[mlx5] kdump over NFS fails: mlx5 driver gives error "Stop room 95 is bigger than the SQ size 64" (BZ#1969909)
-
BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 in bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564)
-
Update CIFS to kernel 5.10 (BZ#1973637)
-
Backport "tick/nohz: Conditionally restart tick on idle exit" to RHEL 8.5 (BZ#1978710)
-
Significant performance drop starting on kernel-4.18.0-277 visible on mmap benchmark (BZ#1980314)
-
Inaccessible NFS server overloads clients (native_queued_spin_lock_slowpath connotation?) (BZ#1980613)
-
[RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new 120HZ panel (BZ#1981250)
-
act_ct: subject to DNAT tuple collision (BZ#1982494)
Enhancement(s):
-
[Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream (BZ#1965415)
-
7.3) - x86_64
-
Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.28. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2021:3263
Space precludes documenting all of the container images in this advisory.
Bug Fix(es):
-
Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3 (BZ#1956462)
-
OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working (BZ#1971669)
-
[4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path" (BZ#1973766)
-
oc logs doesn't work with piepeline builds (BZ#1974264)
-
"provisioned registration errors" cannot be reported (BZ#1976924)
-
AWS Elastic IP permissions are incorrectly required (BZ#1981553)
-
Memory consumption (container_memory_rss) steadily growing for /system.slice/kubelet.service when FIPS enabled [ocp 4.7] (BZ#1981580)
-
Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit (BZ#1981775)
-
Size of the hostname was preventing proper DNS resolution of the worker node names (BZ#1983695)
-
(release-4.7) Insights status card shows nothing when 0 issues found (BZ#1986724)
-
drop-icmp pod blocks direct SSH access to cluster nodes (BZ#1988426)
-
Editing a Deployment drops annotations (BZ#1989642)
-
[Kuryr][4.7] Duplicated egress rule for service network in knp object (BZ#1990175)
-
Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route (BZ#1991445)
-
Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build (BZ#1992240)
-
alerts: SystemMemoryExceedsReservation triggers too quickly (BZ#1992687)
-
failed to start cri-o service due to /usr/libexec/crio/conmon is missing (BZ#1993386)
-
Thanos build failure: vendor/ ignored (BZ#1994123)
-
Ipv6 IP addresses are not accepted for whitelisting (BZ#1994645)
-
upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop (BZ#1994729)
-
linuxptp-daemon crash on 4.8 (BZ#1995579)
-
long living clusters may fail to upgrade because of an invalid conmon path (BZ#1995810)
For more details about the security issue(s), refer to the CVE page(s) listed in the References section.
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-x86_64
The image digest is sha256:b3f38d58057a12b0477bf28971390db3e3391ce1af8ac06e35d0aa9e8d8e5966
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-s390x
The image digest is sha256:30c2011f6d84b16960b981a07558f96a55e59a281449d25c5ccc778aaeb2f970
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.28-ppc64le
The image digest is sha256:52ebf0db5a36434357c24a64863025730d2159a94997333f15fbe1444fa88f4f
Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor
- Solution:
For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html
- Bugs fixed (https://bugzilla.redhat.com/):
1863446 - [Assisted-4.5-M2] clean all does not remove ConfigMaps and PVC 1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1956462 - Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3 1971669 - OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working 1973766 - [4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path" 1974264 - oc logs doesn't work with piepeline builds 1976924 - "provisioned registration errors" cannot be reported 1981553 - AWS Elastic IP permissions are incorrectly required 1981775 - Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit 1983695 - Size of the hostname was preventing proper DNS resolution of the worker node names 1986724 - (release-4.7) Insights status card shows nothing when 0 issues found 1988426 - drop-icmp pod blocks direct SSH access to cluster nodes 1989642 - Editing a Deployment drops annotations 1990175 - [Kuryr][4.7] Duplicated egress rule for service network in knp object 1991445 - Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route 1992240 - Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build 1992687 - alerts: SystemMemoryExceedsReservation triggers too quickly 1993386 - failed to start cri-o service due to /usr/libexec/crio/conmon is missing 1994123 - Thanos build failure: vendor/ ignored 1994645 - Ipv6 IP addresses are not accepted for whitelisting 1994729 - upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop 1995810 - long living clusters may fail to upgrade because of an invalid conmon path 1998112 - Networking issue with vSphere clusters running HW14 and later
-
8.1) - ppc64le, x86_64
-
Description:
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. ========================================================================== Ubuntu Security Notice USN-5094-1 September 29, 2021
linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-oracle, linux-snapdragon vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in the Linux kernel. An attacker who could start and control a VM could possibly use this to expose sensitive information or execute arbitrary code. (CVE-2021-22543)
It was discovered that the tracing subsystem in the Linux kernel did not properly keep track of per-cpu ring buffer state. A privileged attacker could use this to cause a denial of service. (CVE-2021-3679)
Alois Wohlschlager discovered that the overlay file system in the Linux kernel did not restrict private clones in some situations. An attacker could use this to expose sensitive information. (CVE-2021-3732)
Alexey Kardashevskiy discovered that the KVM implementation for PowerPC systems in the Linux kernel did not properly validate RTAS arguments in some situations. An attacker in a guest vm could use this to cause a denial of service (host OS crash) or possibly execute arbitrary code. (CVE-2021-37576)
It was discovered that the MAX-3421 host USB device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-38204)
It was discovered that the Xilinx 10/100 Ethernet Lite device driver in the Linux kernel could report pointer addresses in some situations. An attacker could use this information to ease the exploitation of another vulnerability. (CVE-2021-38205)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: linux-image-4.15.0-1028-dell300x 4.15.0-1028.33 linux-image-4.15.0-1081-oracle 4.15.0-1081.89 linux-image-4.15.0-1100-kvm 4.15.0-1100.102 linux-image-4.15.0-1109-gcp 4.15.0-1109.123 linux-image-4.15.0-1112-aws 4.15.0-1112.119 linux-image-4.15.0-1113-snapdragon 4.15.0-1113.122 linux-image-4.15.0-1124-azure 4.15.0-1124.137 linux-image-4.15.0-159-generic 4.15.0-159.167 linux-image-4.15.0-159-generic-lpae 4.15.0-159.167 linux-image-4.15.0-159-lowlatency 4.15.0-159.167 linux-image-aws-lts-18.04 4.15.0.1112.115 linux-image-azure-lts-18.04 4.15.0.1124.97 linux-image-dell300x 4.15.0.1028.30 linux-image-gcp-lts-18.04 4.15.0.1109.128 linux-image-generic 4.15.0.159.148 linux-image-generic-lpae 4.15.0.159.148 linux-image-kvm 4.15.0.1100.96 linux-image-lowlatency 4.15.0.159.148 linux-image-oracle-lts-18.04 4.15.0.1081.91 linux-image-snapdragon 4.15.0.1113.116 linux-image-virtual 4.15.0.159.148
Ubuntu 16.04 ESM: linux-image-4.15.0-1081-oracle 4.15.0-1081.89~16.04.1 linux-image-4.15.0-1109-gcp 4.15.0-1109.123~16.04.1 linux-image-4.15.0-1112-aws 4.15.0-1112.119~16.04.1 linux-image-4.15.0-1124-azure 4.15.0-1124.137~16.04.1 linux-image-4.15.0-159-generic 4.15.0-159.167~16.04.1 linux-image-4.15.0-159-lowlatency 4.15.0-159.167~16.04.1 linux-image-aws-hwe 4.15.0.1112.103 linux-image-azure 4.15.0.1124.115 linux-image-gcp 4.15.0.1109.110 linux-image-generic-hwe-16.04 4.15.0.159.152 linux-image-gke 4.15.0.1109.110 linux-image-lowlatency-hwe-16.04 4.15.0.159.152 linux-image-oem 4.15.0.159.152 linux-image-oracle 4.15.0.1081.69 linux-image-virtual-hwe-16.04 4.15.0.159.152
Ubuntu 14.04 ESM: linux-image-4.15.0-1124-azure 4.15.0-1124.137~14.04.1 linux-image-azure 4.15.0.1124.97
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202105-1451", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "h410s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h700s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h500e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "h700e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "cloud backup", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "34" }, { "model": "h300e", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "solidfire baseboard management controller", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2021-05-18" }, { "model": "h500s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h300s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "h410c", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22543" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2021-05-18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22543" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "164478" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "163926" }, { "db": "PACKETSTORM", "id": "163768" }, { "db": "PACKETSTORM", "id": "164469" }, { "db": "PACKETSTORM", "id": "163972" }, { "db": "PACKETSTORM", "id": "164028" }, { "db": "PACKETSTORM", "id": "163861" } ], "trust": 0.8 }, "cve": "CVE-2021-22543", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380980", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-22543", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22543", "trust": 1.0, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380980", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22543", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation. Arch Linux is an application system of Arch open source. A lightweight and flexible Linux\u00ae distribution that tries to keep it simple. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security update\nAdvisory ID: RHSA-2021:3812-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:3812\nIssue date: 2021-10-12\nCVE Names: CVE-2021-3653 CVE-2021-3656 CVE-2021-22543\n CVE-2021-22555 CVE-2021-37576\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.6\nAdvanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update\nSupport, and Red Hat Enterprise Linux 7.6 Update Services for SAP\nSolutions. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.6) - noarch, x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.6) - noarch, ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server Optional E4S (v. 7.6) - ppc64le, x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 7.6) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.6) - noarch, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.6):\n\nSource:\nkernel-3.10.0-957.84.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.84.1.el7.noarch.rpm\nkernel-doc-3.10.0-957.84.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-devel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-headers-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.84.1.el7.x86_64.rpm\nperf-3.10.0-957.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.6):\n\nSource:\nkernel-3.10.0-957.84.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.84.1.el7.noarch.rpm\nkernel-doc-3.10.0-957.84.1.el7.noarch.rpm\n\nppc64le:\nkernel-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-957.84.1.el7.ppc64le.rpm\nperf-3.10.0-957.84.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\npython-perf-3.10.0-957.84.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-devel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-headers-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.84.1.el7.x86_64.rpm\nperf-3.10.0-957.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.6):\n\nSource:\nkernel-3.10.0-957.84.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-957.84.1.el7.noarch.rpm\nkernel-doc-3.10.0-957.84.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-devel-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-headers-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-957.84.1.el7.x86_64.rpm\nperf-3.10.0-957.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 7.6):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional E4S (v. 7.6):\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-957.84.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 7.6):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-957.84.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-957.84.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-3653\nhttps://access.redhat.com/security/cve/CVE-2021-3656\nhttps://access.redhat.com/security/cve/CVE-2021-22543\nhttps://access.redhat.com/security/cve/CVE-2021-22555\nhttps://access.redhat.com/security/cve/CVE-2021-37576\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nS627544rR1c=4NQZ\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.3.3 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with\nsecurity policy built in. \n\nSecurity fixes: \n\n* nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a\npointer to a root domain name (CVE-2021-23017)\n\n* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)\n\n* redis: Integer overflow issue with Streams (CVE-2021-32627)\n\n* redis: Integer overflow bug in the ziplist data structure\n(CVE-2021-32628)\n\n* redis: Integer overflow issue with intsets (CVE-2021-32687)\n\n* redis: Integer overflow issue with strings (CVE-2021-41099)\n\n* redis: Out of bounds read in lua debugger protocol parser\n(CVE-2021-32672)\n\n* redis: Denial of service via Redis Standard Protocol (RESP) request\n(CVE-2021-32675)\n\n* helm: information disclosure vulnerability (CVE-2021-32690)\n\nBug fixes:\n\n* KUBE-API: Support move agent to different cluster in the same namespace\n(BZ# 1977358)\n\n* Add columns to the Agent CRD list (BZ# 1977398)\n\n* ClusterDeployment controller watches all Secrets from all namespaces (BZ#\n1986081)\n\n* RHACM 2.3.3 images (BZ# 1999365)\n\n* Workaround for Network Manager not supporting nmconnections priority (BZ#\n2001294)\n\n* create cluster page empty in Safary Browser (BZ# 2002280)\n\n* Compliance state doesn\u0027t get updated after fixing the issue causing\ninitially the policy not being able to update the managed object (BZ#\n2002667)\n\n* Overview page displays VMware based managed cluster as other (BZ#\n2004188)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name\n1977358 - [4.8.0] KUBE-API: Support move agent to different cluster in the same namespace\n1977398 - [4.8.0] [master] Add columns to the Agent CRD list\n1978144 - CVE-2021-32690 helm: information disclosure vulnerability\n1986081 - [4.8.0] ClusterDeployment controller watches all Secrets from all namespaces\n1999365 - RHACM 2.3.3 images\n2001294 - [4.8.0] Workaround for Network Manager not supporting nmconnections priority\n2002280 - create cluster page empty in Safary Browser\n2002667 - Compliance state doesn\u0027t get updated after fixing the issue causing initially the policy not being able to update the managed object\n2004188 - Overview page displays VMware based managed cluster as other\n2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets\n2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request\n2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser\n2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure\n2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams\n2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack\n2011020 - CVE-2021-41099 redis: Integer overflow issue with strings\n\n5. \nThese packages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. RHVH features a Cockpit user interface for\nmonitoring the host\u0027s resources and performing administrative tasks. \n\nBug Fix(es):\n\n* Rebase package(s) to version: 1.2.23\n\nHighlights, important fixes, or notable enhancements: \n\n* imgbase should not copy the selinux binary policy file (BZ# 1979624)\n(BZ#1989397)\n\n* RHV-H has been rebased on Red Hat Enterprise Linux 8.4 Batch #2. \n(BZ#1975177)\n\n4. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nBug Fix(es):\n\n* Urgent: Missing dptf_power.ko module in RHEL8 (BZ#1968381)\n\n* [mlx5] kdump over NFS fails: mlx5 driver gives error \"Stop room 95 is\nbigger than the SQ size 64\" (BZ#1969909)\n\n* BUG: unable to handle kernel NULL pointer dereference at 0000000000000000\nin bluetooth hci_error_reset on intel-tigerlake-h01 (BZ#1972564)\n\n* Update CIFS to kernel 5.10 (BZ#1973637)\n\n* Backport \"tick/nohz: Conditionally restart tick on idle exit\" to RHEL 8.5\n(BZ#1978710)\n\n* Significant performance drop starting on kernel-4.18.0-277 visible on\nmmap benchmark (BZ#1980314)\n\n* Inaccessible NFS server overloads clients\n(native_queued_spin_lock_slowpath connotation?) (BZ#1980613)\n\n* [RHEL8.4 BUG],RialtoMLK, I915 graphic driver failed to boot with one new\n120HZ panel (BZ#1981250)\n\n* act_ct: subject to DNAT tuple collision (BZ#1982494)\n\nEnhancement(s):\n\n* [Lenovo 8.5 FEAT] drivers/nvme - Update to the latest upstream\n(BZ#1965415)\n\n4. 7.3) - x86_64\n\n3. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.7.28. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHBA-2021:3263\n\nSpace precludes documenting all of the container images in this advisory. \n\nBug Fix(es):\n\n* Machine Config Operator degrades during cluster update with failed to\nconvert Ignition config spec v2 to v3 (BZ#1956462)\n\n* OCP IPI Publish Internal - GCP: Load Balancer service with External\nTraffic Policy as Local is not working (BZ#1971669)\n\n* [4.7] Unable to attach Vsphere volume shows the error \"failed to get\ncanonical path\" (BZ#1973766)\n\n* oc logs doesn\u0027t work with piepeline builds (BZ#1974264)\n\n* \"provisioned registration errors\" cannot be reported (BZ#1976924)\n\n* AWS Elastic IP permissions are incorrectly required (BZ#1981553)\n\n* Memory consumption (container_memory_rss) steadily growing for\n/system.slice/kubelet.service when FIPS enabled [ocp 4.7] (BZ#1981580)\n\n* Problematic Deployment creates infinite number Replicasets causing etcd\nto reach quota limit (BZ#1981775)\n\n* Size of the hostname was preventing proper DNS resolution of the worker\nnode names (BZ#1983695)\n\n* (release-4.7) Insights status card shows nothing when 0 issues found\n(BZ#1986724)\n\n* drop-icmp pod blocks direct SSH access to cluster nodes (BZ#1988426)\n\n* Editing a Deployment drops annotations (BZ#1989642)\n\n* [Kuryr][4.7] Duplicated egress rule for service network in knp object\n(BZ#1990175)\n\n* Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route\n(BZ#1991445)\n\n* Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS\n47 RHEL 8.4 based build (BZ#1992240)\n\n* alerts: SystemMemoryExceedsReservation triggers too quickly (BZ#1992687)\n\n* failed to start cri-o service due to /usr/libexec/crio/conmon is missing\n(BZ#1993386)\n\n* Thanos build failure: vendor/ ignored (BZ#1994123)\n\n* Ipv6 IP addresses are not accepted for whitelisting (BZ#1994645)\n\n* upgrade from 4.6 to 4.7 to 4.8 with mcp worker \"paused=true\", crio\nreport \"panic: close of closed channel\" which lead to a master Node go into\nRestart loop (BZ#1994729)\n\n* linuxptp-daemon crash on 4.8 (BZ#1995579)\n\n* long living clusters may fail to upgrade because of an invalid conmon\npath (BZ#1995810)\n\nFor more details about the security issue(s), refer to the CVE\npage(s) listed in the References section. \n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.28-x86_64\n\nThe image digest is\nsha256:b3f38d58057a12b0477bf28971390db3e3391ce1af8ac06e35d0aa9e8d8e5966\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.28-s390x\n\nThe image digest is\nsha256:30c2011f6d84b16960b981a07558f96a55e59a281449d25c5ccc778aaeb2f970\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.28-ppc64le\n\nThe image digest is\nsha256:52ebf0db5a36434357c24a64863025730d2159a94997333f15fbe1444fa88f4f\n\nInstructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1863446 - [Assisted-4.5-M2] clean all does not remove ConfigMaps and PVC\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1956462 - Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3\n1971669 - OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working\n1973766 - [4.7] Unable to attach Vsphere volume shows the error \"failed to get canonical path\"\n1974264 - oc logs doesn\u0027t work with piepeline builds\n1976924 - \"provisioned registration errors\" cannot be reported\n1981553 - AWS Elastic IP permissions are incorrectly required\n1981775 - Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit\n1983695 - Size of the hostname was preventing proper DNS resolution of the worker node names\n1986724 - (release-4.7) Insights status card shows nothing when 0 issues found\n1988426 - drop-icmp pod blocks direct SSH access to cluster nodes\n1989642 - Editing a Deployment drops annotations\n1990175 - [Kuryr][4.7] Duplicated egress rule for service network in knp object\n1991445 - Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route\n1992240 - Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build\n1992687 - alerts: SystemMemoryExceedsReservation triggers too quickly\n1993386 - failed to start cri-o service due to /usr/libexec/crio/conmon is missing\n1994123 - Thanos build failure: vendor/ ignored\n1994645 - Ipv6 IP addresses are not accepted for whitelisting\n1994729 - upgrade from 4.6 to 4.7 to 4.8 with mcp worker \"paused=true\", crio report \"panic: close of closed channel\" which lead to a master Node go into Restart loop\n1995810 - long living clusters may fail to upgrade because of an invalid conmon path\n1998112 - Networking issue with vSphere clusters running HW14 and later\n\n5. 8.1) - ppc64le, x86_64\n\n3. Description:\n\nThis is a kernel live patch module which is automatically loaded by the RPM\npost-install script to modify the code of a running kernel. ==========================================================================\nUbuntu Security Notice USN-5094-1\nSeptember 29, 2021\n\nlinux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,\nlinux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm,\nlinux-oracle, linux-snapdragon vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 ESM\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. An attacker who could start and\ncontrol a VM could possibly use this to expose sensitive information or\nexecute arbitrary code. (CVE-2021-22543)\n\nIt was discovered that the tracing subsystem in the Linux kernel did not\nproperly keep track of per-cpu ring buffer state. A privileged attacker\ncould use this to cause a denial of service. (CVE-2021-3679)\n\nAlois Wohlschlager discovered that the overlay file system in the Linux\nkernel did not restrict private clones in some situations. An attacker\ncould use this to expose sensitive information. (CVE-2021-3732)\n\nAlexey Kardashevskiy discovered that the KVM implementation for PowerPC\nsystems in the Linux kernel did not properly validate RTAS arguments in\nsome situations. An attacker in a guest vm could use this to cause a denial\nof service (host OS crash) or possibly execute arbitrary code. \n(CVE-2021-37576)\n\nIt was discovered that the MAX-3421 host USB device driver in the Linux\nkernel did not properly handle device removal events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2021-38204)\n\nIt was discovered that the Xilinx 10/100 Ethernet Lite device driver in the\nLinux kernel could report pointer addresses in some situations. An attacker\ncould use this information to ease the exploitation of another\nvulnerability. (CVE-2021-38205)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n linux-image-4.15.0-1028-dell300x 4.15.0-1028.33\n linux-image-4.15.0-1081-oracle 4.15.0-1081.89\n linux-image-4.15.0-1100-kvm 4.15.0-1100.102\n linux-image-4.15.0-1109-gcp 4.15.0-1109.123\n linux-image-4.15.0-1112-aws 4.15.0-1112.119\n linux-image-4.15.0-1113-snapdragon 4.15.0-1113.122\n linux-image-4.15.0-1124-azure 4.15.0-1124.137\n linux-image-4.15.0-159-generic 4.15.0-159.167\n linux-image-4.15.0-159-generic-lpae 4.15.0-159.167\n linux-image-4.15.0-159-lowlatency 4.15.0-159.167\n linux-image-aws-lts-18.04 4.15.0.1112.115\n linux-image-azure-lts-18.04 4.15.0.1124.97\n linux-image-dell300x 4.15.0.1028.30\n linux-image-gcp-lts-18.04 4.15.0.1109.128\n linux-image-generic 4.15.0.159.148\n linux-image-generic-lpae 4.15.0.159.148\n linux-image-kvm 4.15.0.1100.96\n linux-image-lowlatency 4.15.0.159.148\n linux-image-oracle-lts-18.04 4.15.0.1081.91\n linux-image-snapdragon 4.15.0.1113.116\n linux-image-virtual 4.15.0.159.148\n\nUbuntu 16.04 ESM:\n linux-image-4.15.0-1081-oracle 4.15.0-1081.89~16.04.1\n linux-image-4.15.0-1109-gcp 4.15.0-1109.123~16.04.1\n linux-image-4.15.0-1112-aws 4.15.0-1112.119~16.04.1\n linux-image-4.15.0-1124-azure 4.15.0-1124.137~16.04.1\n linux-image-4.15.0-159-generic 4.15.0-159.167~16.04.1\n linux-image-4.15.0-159-lowlatency 4.15.0-159.167~16.04.1\n linux-image-aws-hwe 4.15.0.1112.103\n linux-image-azure 4.15.0.1124.115\n linux-image-gcp 4.15.0.1109.110\n linux-image-generic-hwe-16.04 4.15.0.159.152\n linux-image-gke 4.15.0.1109.110\n linux-image-lowlatency-hwe-16.04 4.15.0.159.152\n linux-image-oem 4.15.0.159.152\n linux-image-oracle 4.15.0.1081.69\n linux-image-virtual-hwe-16.04 4.15.0.159.152\n\nUbuntu 14.04 ESM:\n linux-image-4.15.0-1124-azure 4.15.0-1124.137~14.04.1\n linux-image-azure 4.15.0.1124.97\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well", "sources": [ { "db": "NVD", "id": "CVE-2021-22543" }, { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164478" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "163926" }, { "db": "PACKETSTORM", "id": "163768" }, { "db": "PACKETSTORM", "id": "164469" }, { "db": "PACKETSTORM", "id": "163972" }, { "db": "PACKETSTORM", "id": "164028" }, { "db": "PACKETSTORM", "id": "163861" }, { "db": "PACKETSTORM", "id": "164331" }, { "db": "PACKETSTORM", "id": "164237" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22543", "trust": 2.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/06/26/1", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "164589", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164666", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164652", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "167858", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164583", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-380980", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22543", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164478", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164562", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163926", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163768", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164469", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163972", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164028", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163861", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164331", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164237", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164478" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "163926" }, { "db": "PACKETSTORM", "id": "163768" }, { "db": "PACKETSTORM", "id": "164469" }, { "db": "PACKETSTORM", "id": "163972" }, { "db": "PACKETSTORM", "id": "164028" }, { "db": "PACKETSTORM", "id": "163861" }, { "db": "PACKETSTORM", "id": "164331" }, { "db": "PACKETSTORM", "id": "164237" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "id": "VAR-202105-1451", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380980" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:21:39.668000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20225640 - security advisory" }, { "title": "Red Hat: CVE-2021-22543", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2021-22543" }, { "title": "Amazon Linux 2: ALAS2-2021-1699", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2021-1699" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2021-22543 log" }, { "title": "Amazon Linux AMI: ALAS-2021-1539", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2021-1539" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-004", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2kernel-5.4-2022-004" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.10-2022-002", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2kernel-5.10-2022-002" }, { "title": "CVE-2021-22543", "trust": 0.1, "url": "https://github.com/jamesgeeee/cve-2021-22543 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20210708-0002/" }, { "trust": 1.2, "url": "https://github.com/google/security-research/security/advisories/ghsa-7wq5-phmq-m584" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html" }, { "trust": 1.2, "url": "http://www.openwall.com/lists/oss-security/2021/06/26/1" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22543" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4g5ybuvephzyxmkngbz3s6infcteel4e/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/roqixqb7zawi3ksgshr6h5rduwzi775s/" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2021-22543" }, { "trust": 0.8, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.8, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.8, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22555" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2021-22555" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37576" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2021-3609" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3609" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-37576" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/roqixqb7zawi3ksgshr6h5rduwzi775s/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4g5ybuvephzyxmkngbz3s6infcteel4e/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3653" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3656" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3653" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3656" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-32399" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:5640" }, { "trust": 0.1, "url": "https://github.com/jamesgeeee/cve-2021-22543" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3812" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22922" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-36222" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32626" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32687" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-37750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21670" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32626" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41099" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25741" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23840" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22923" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32675" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22924" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37750" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22922" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21671" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4658" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22924" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32675" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4658" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3925" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-41099" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32627" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32687" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32690" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32628" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21671" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32672" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32690" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23841" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23017" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25741" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32627" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32672" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22923" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23840" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-32628" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3235" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3621" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3057" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3766" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3380" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3121" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3262" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhba-2021:3263" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3121" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27218" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27218" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3181" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1100.102" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38204" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1028.33" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1109.123" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1081.89" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-38205" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3732" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1113.122" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1124.137" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5094-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1112.119" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3679" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-159.167" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5071-1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5071-3" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3612" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1043.47~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1043.47" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164478" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "163926" }, { "db": "PACKETSTORM", "id": "163768" }, { "db": "PACKETSTORM", "id": "164469" }, { "db": "PACKETSTORM", "id": "163972" }, { "db": "PACKETSTORM", "id": "164028" }, { "db": "PACKETSTORM", "id": "163861" }, { "db": "PACKETSTORM", "id": "164331" }, { "db": "PACKETSTORM", "id": "164237" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380980" }, { "db": "VULMON", "id": "CVE-2021-22543" }, { "db": "PACKETSTORM", "id": "164478" }, { "db": "PACKETSTORM", "id": "164562" }, { "db": "PACKETSTORM", "id": "163926" }, { "db": "PACKETSTORM", "id": "163768" }, { "db": "PACKETSTORM", "id": "164469" }, { "db": "PACKETSTORM", "id": "163972" }, { "db": "PACKETSTORM", "id": "164028" }, { "db": "PACKETSTORM", "id": "163861" }, { "db": "PACKETSTORM", "id": "164331" }, { "db": "PACKETSTORM", "id": "164237" }, { "db": "NVD", "id": "CVE-2021-22543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-05-26T00:00:00", "db": "VULHUB", "id": "VHN-380980" }, { "date": "2021-05-26T00:00:00", "db": "VULMON", "id": "CVE-2021-22543" }, { "date": "2021-10-12T15:34:44", "db": "PACKETSTORM", "id": "164478" }, { "date": "2021-10-20T15:45:47", "db": "PACKETSTORM", "id": "164562" }, { "date": "2021-08-28T13:22:22", "db": "PACKETSTORM", "id": "163926" }, { "date": "2021-08-10T14:48:02", "db": "PACKETSTORM", "id": "163768" }, { "date": "2021-10-12T15:33:21", "db": "PACKETSTORM", "id": "164469" }, { "date": "2021-08-31T15:58:41", "db": "PACKETSTORM", "id": "163972" }, { "date": "2021-09-02T15:23:31", "db": "PACKETSTORM", "id": "164028" }, { "date": "2021-08-17T15:14:36", "db": "PACKETSTORM", "id": "163861" }, { "date": "2021-09-29T14:51:35", "db": "PACKETSTORM", "id": "164331" }, { "date": "2021-09-22T16:24:38", "db": "PACKETSTORM", "id": "164237" }, { "date": "2021-05-26T11:15:08.623000", "db": "NVD", "id": "CVE-2021-22543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-01T00:00:00", "db": "VULHUB", "id": "VHN-380980" }, { "date": "2022-04-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22543" }, { "date": "2024-05-29T20:15:09.870000", "db": "NVD", "id": "CVE-2021-22543" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "164237" } ], "trust": 0.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat Security Advisory 2021-3812-01", "sources": [ { "db": "PACKETSTORM", "id": "164478" } ], "trust": 0.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "arbitrary", "sources": [ { "db": "PACKETSTORM", "id": "164331" }, { "db": "PACKETSTORM", "id": "164237" } ], "trust": 0.2 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.