var-202103-0920
Vulnerability from variot
An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64
Bug Fix(es):
-
Upstream Patch for Gracefully handle DMAR units with no supported address widthsx86/vt-d (BZ#1932201)
-
RHEL8.1 Alpha - ISST-LTE:PNV:Witherspoon-DD2.3:woo: KDUMP hang during shutdown, lpfc loses connection to disks (rootdisk:nvme) (BZ#1934306)
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2021:1070-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1070 Issue date: 2021-04-06 CVE Names: CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 ==================================================================== 1. Summary:
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux for Real Time (v. 7) - noarch, x86_64 Red Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
-
kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)
-
kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)
-
kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
RHEL7.9 Realtime crashes due to a blocked task detection. The blocked task is stuck in unregister_shrinker() where multiple tasks have taken the shrinker_rwsem and are fighting on a dentry's d_lockref lock rt_mutex. [kernel-rt] (BZ#1935557)
-
kernel-rt: update to the latest RHEL7.9.z5 source tree (BZ#1939220)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem 1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles 1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module
- Package List:
Red Hat Enterprise Linux for Real Time for NFV (v. 7):
Source: kernel-rt-3.10.0-1160.24.1.rt56.1161.el7.src.rpm
noarch: kernel-rt-doc-3.10.0-1160.24.1.rt56.1161.el7.noarch.rpm
x86_64: kernel-rt-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-kvm-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-kvm-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-kvm-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-kvm-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-kvm-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-kvm-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm
Red Hat Enterprise Linux for Real Time (v. 7):
Source: kernel-rt-3.10.0-1160.24.1.rt56.1161.el7.src.rpm
noarch: kernel-rt-doc-3.10.0-1160.24.1.rt56.1161.el7.noarch.rpm
x86_64: kernel-rt-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debug-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-debuginfo-common-x86_64-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm kernel-rt-trace-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2021-27363 https://access.redhat.com/security/cve/CVE-2021-27364 https://access.redhat.com/security/cve/CVE-2021-27365 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYGwUItzjgjWX9erEAQjxsA//SlDSD/SJHCxceZvPrzgBTa7x6icArqhH 08++iBcxQ924tX3O9AizfbKGi4SfixaLnkTK/ZmucTD1nctMxvbQU/bSwnqT6NEv SIEMMhxnwCG09utCX1hlKMjOjtwT53oapInBu8svGowlXzOg4WSzBLv5q7A7QmuQ uFkSrymbQvoGVsDW3cee2xksPtHDuXg7rsNrnr5sfpyY0qrONgiy9WnhR4C/fCw3 uG/kedTHM4tTT0+8JgC4hfiAOZSSf6cowobPkE/kmOGxmUdLC8G4aRNQzOP/PPyp MXQfo77P5Oq8FDt28DqlTTxu589YKUiY0/QtiCy4+nKMQ3eCFu6MK8es20VEamrk CSr8Ms5OzUbAgEwlQnqcKjaXqEa6Z10SrqgL6tVYQmnqmO5y8XcnAJTNN8aAjvWj 6FoTLwpcGkNuL6ctaUjf8+tv/ybZG5OTLgvBto8pmS4pQBldxsn5MJUERye3POes lh6QZtE3x59NsuDV0nczleVHO7pHbgpe5EiNXufRIVp9VvH6VU3JArSFq5GOwqNC TRei+AumL9AL9cUWUE50DR3aBiPvXUbYabz8v0e5fPeXl/EkQAiypT4l82bxwoqI l7CV1v62LoyfaPfHq34dPZA8I4BAdqorDYSDbtcgkOO1W1T4NeNOIBRJn6J/n8QW r8zE0R3Ih9M=OvRU -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 7.2) - x86_64
Bug Fix(es):
-
Enable CI and changelog for GitLab workflow (BZ#1930934)
-
Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM
Summary
Several security issues were fixed in the kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-27170)
Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not properly compute a speculative execution limit on pointer arithmetic in some situations. A local attacker could use this to expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash). (CVE-2020-29372)
It was discovered that the memory management subsystem in the Linux kernel did not properly handle copy-on-write operations in some situations. A local attacker could possibly use this to gain unintended write access to read-only memory pages. (CVE-2020-29374)
De4dCr0w of 360 Alpha Lab discovered that the BPF verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker could use this to expose sensitive information (kernel memory) or possibly execute arbitrary code. (CVE-2021-3444)
Adam Nichols discovered that the iSCSI subsystem in the Linux kernel did not properly restrict access to iSCSI transport handles. A local attacker could use this to cause a denial of service or expose sensitive information (kernel pointer addresses). A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-27365)
Update instructions
The problem can be corrected by updating your kernel livepatch to the following versions:
Ubuntu 18.04 LTS aws - 75.2 generic - 75.2 gke - 75.2 gkeop - 75.2 lowlatency - 75.2 oem - 75.2
Ubuntu 20.04 LTS aws - 75.2 azure - 75.2 gcp - 75.2 generic - 75.2 gke - 75.2 gkeop - 75.2 lowlatency - 75.2
Ubuntu 16.04 LTS aws - 75.3 azure - 75.2 generic - 75.3 lowlatency - 75.3
Ubuntu 14.04 ESM generic - 75.3 lowlatency - 75.3
Support Information
Kernels older than the levels listed below do not receive livepatch updates. If you are running a kernel version earlier than the one listed below, please upgrade your kernel as soon as possible.
Ubuntu 18.04 LTS linux-aws - 4.15.0-1054 linux-gke-4.15 - 4.15.0-1076 linux-gke-5.4 - 5.4.0-1009 linux-gkeop-5.4 - 5.4.0-1007 linux-hwe-5.4 - 5.4.0-26 linux-oem - 4.15.0-1063 linux - 4.15.0-69
Ubuntu 20.04 LTS linux-aws - 5.4.0-1009 linux-azure - 5.4.0-1010 linux-gcp - 5.4.0-1009 linux-gke - 5.4.0-1033 linux-gkeop - 5.4.0-1009 linux-oem - 5.4.0-26 linux - 5.4.0-26
Ubuntu 16.04 LTS linux-aws - 4.4.0-1098 linux-azure - 4.15.0-1063 linux-hwe - 4.15.0-69 linux - 4.4.0-168
Ubuntu 14.04 ESM linux-lts-xenial - 4.4.0-168
References
- CVE-2020-27170
- CVE-2020-27171
- CVE-2020-29372
- CVE-2020-29374
- CVE-2021-3444
- CVE-2021-27363
- CVE-2021-27364
- CVE-2021-27365
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce .
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "lte", "trust": 1.0, "vendor": "linux", "version": "5.11.3" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "solidfire baseboard management controller", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "cloud backup", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "kernel", "scope": null, "trust": 0.8, "vendor": "linux", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "db": "NVD", "id": "CVE-2021-27363" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "162156" }, { "db": "PACKETSTORM", "id": "162095" }, { "db": "PACKETSTORM", "id": "162255" } ], "trust": 0.3 }, "cve": "CVE-2021-27363", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2021-27363", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-386598", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2021-27363", "impactScore": 2.5, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "Low", "baseScore": 4.4, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-27363", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-27363", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2021-27363", "trust": 0.8, "value": "Medium" }, { "author": "VULHUB", "id": "VHN-386598", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-27363", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-386598" }, { "db": "VULMON", "id": "CVE-2021-27363" }, { "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "db": "NVD", "id": "CVE-2021-27363" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. 8.1) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. \n\nBug Fix(es):\n\n* Upstream Patch for Gracefully handle DMAR units with no supported address\nwidthsx86/vt-d (BZ#1932201)\n\n* RHEL8.1 Alpha - ISST-LTE:PNV:Witherspoon-DD2.3:woo: KDUMP hang during\nshutdown, lpfc loses connection to disks (rootdisk:nvme) (BZ#1934306)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel-rt security and bug fix update\nAdvisory ID: RHSA-2021:1070-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:1070\nIssue date: 2021-04-06\nCVE Names: CVE-2021-27363 CVE-2021-27364 CVE-2021-27365\n====================================================================\n1. Summary:\n\nAn update for kernel-rt is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux for Real Time (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux for Real Time for NFV (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nSecurity Fix(es):\n\n* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)\n\n* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)\n\n* kernel: iscsi: unrestricted access to sessions and handles\n(CVE-2021-27363)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* RHEL7.9 Realtime crashes due to a blocked task detection. The blocked\ntask is stuck in unregister_shrinker() where multiple tasks have taken the\nshrinker_rwsem and are fighting on a dentry\u0027s d_lockref lock rt_mutex. \n[kernel-rt] (BZ#1935557)\n\n* kernel-rt: update to the latest RHEL7.9.z5 source tree (BZ#1939220)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem\n1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles\n1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module\n\n6. Package List:\n\nRed Hat Enterprise Linux for Real Time for NFV (v. 7):\n\nSource:\nkernel-rt-3.10.0-1160.24.1.rt56.1161.el7.src.rpm\n\nnoarch:\nkernel-rt-doc-3.10.0-1160.24.1.rt56.1161.el7.noarch.rpm\n\nx86_64:\nkernel-rt-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-kvm-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-kvm-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-kvm-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-kvm-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-kvm-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-kvm-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\n\nRed Hat Enterprise Linux for Real Time (v. 7):\n\nSource:\nkernel-rt-3.10.0-1160.24.1.rt56.1161.el7.src.rpm\n\nnoarch:\nkernel-rt-doc-3.10.0-1160.24.1.rt56.1161.el7.noarch.rpm\n\nx86_64:\nkernel-rt-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debug-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-debuginfo-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\nkernel-rt-trace-devel-3.10.0-1160.24.1.rt56.1161.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-27363\nhttps://access.redhat.com/security/cve/CVE-2021-27364\nhttps://access.redhat.com/security/cve/CVE-2021-27365\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nr8zE0R3Ih9M=OvRU\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. 7.2) - x86_64\n\n3. \n\nBug Fix(es):\n\n* Enable CI and changelog for GitLab workflow (BZ#1930934)\n\n4. Linux kernel vulnerabilities\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 20.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary\n\nSeveral security issues were fixed in the kernel. A\nlocal attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2020-27170)\n\nPiotr Krysiuk discovered that the BPF subsystem in the Linux kernel did\nnot properly compute a speculative execution limit on pointer arithmetic\nin some situations. A local attacker could use this to expose sensitive\ninformation (kernel memory). A local attacker could use this to cause a denial of\nservice (system crash). (CVE-2020-29372)\n\nIt was discovered that the memory management subsystem in the Linux\nkernel did not properly handle copy-on-write operations in some\nsituations. A local attacker could possibly use this to gain unintended\nwrite access to read-only memory pages. (CVE-2020-29374)\n\nDe4dCr0w of 360 Alpha Lab discovered that the BPF verifier in the Linux\nkernel did not properly handle mod32 destination register truncation when\nthe source register was known to be 0. A local attacker could use this to\nexpose sensitive information (kernel memory) or possibly execute arbitrary\ncode. (CVE-2021-3444)\n\nAdam Nichols discovered that the iSCSI subsystem in the Linux kernel did\nnot properly restrict access to iSCSI transport handles. A local\nattacker could use this to cause a denial of service or expose sensitive\ninformation (kernel pointer addresses). A local attacker could use this to cause\na denial of service (system crash) or expose sensitive information\n(kernel memory). A local attacker could use this to cause\na denial of service (system crash) or possibly execute arbitrary code. \n(CVE-2021-27365)\n\nUpdate instructions\n\nThe problem can be corrected by updating your kernel livepatch to the\nfollowing versions:\n\nUbuntu 18.04 LTS\n aws - 75.2\n generic - 75.2\n gke - 75.2\n gkeop - 75.2\n lowlatency - 75.2\n oem - 75.2\n\nUbuntu 20.04 LTS\n aws - 75.2\n azure - 75.2\n gcp - 75.2\n generic - 75.2\n gke - 75.2\n gkeop - 75.2\n lowlatency - 75.2\n\nUbuntu 16.04 LTS\n aws - 75.3\n azure - 75.2\n generic - 75.3\n lowlatency - 75.3\n\nUbuntu 14.04 ESM\n generic - 75.3\n lowlatency - 75.3\n\nSupport Information\n\nKernels older than the levels listed below do not receive livepatch\nupdates. If you are running a kernel version earlier than the one \nlisted below, please upgrade your kernel as soon as possible. \n\nUbuntu 18.04 LTS\n linux-aws - 4.15.0-1054\n linux-gke-4.15 - 4.15.0-1076\n linux-gke-5.4 - 5.4.0-1009\n linux-gkeop-5.4 - 5.4.0-1007\n linux-hwe-5.4 - 5.4.0-26\n linux-oem - 4.15.0-1063\n linux - 4.15.0-69\n\nUbuntu 20.04 LTS\n linux-aws - 5.4.0-1009\n linux-azure - 5.4.0-1010\n linux-gcp - 5.4.0-1009\n linux-gke - 5.4.0-1033\n linux-gkeop - 5.4.0-1009\n linux-oem - 5.4.0-26\n linux - 5.4.0-26\n\nUbuntu 16.04 LTS\n linux-aws - 4.4.0-1098\n linux-azure - 4.15.0-1063\n linux-hwe - 4.15.0-69\n linux - 4.4.0-168\n\nUbuntu 14.04 ESM\n linux-lts-xenial - 4.4.0-168\n\nReferences\n\n- CVE-2020-27170\n- CVE-2020-27171\n- CVE-2020-29372\n- CVE-2020-29374\n- CVE-2021-3444\n- CVE-2021-27363\n- CVE-2021-27364\n- CVE-2021-27365\n\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well", "sources": [ { "db": "NVD", "id": "CVE-2021-27363" }, { "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "db": "VULHUB", "id": "VHN-386598" }, { "db": "VULMON", "id": "CVE-2021-27363" }, { "db": "PACKETSTORM", "id": "162156" }, { "db": "PACKETSTORM", "id": "162095" }, { "db": "PACKETSTORM", "id": "162255" }, { "db": "PACKETSTORM", "id": "161973" }, { "db": "PACKETSTORM", "id": "162117" }, { "db": "PACKETSTORM", "id": "161909" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-27363", "trust": 2.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/03/06/1", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "162117", "trust": 1.3 }, { "db": "JVNDB", "id": "JVNDB-2021-004361", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "162095", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "162156", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "161973", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "161909", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "162255", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "161952", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162115", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162341", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162478", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162246", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162528", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162151", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162247", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162098", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162346", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162383", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162108", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162242", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162112", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "162337", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-202103-523", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-386598", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-27363", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-386598" }, { "db": "VULMON", "id": "CVE-2021-27363" }, { "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "db": "PACKETSTORM", "id": "162156" }, { "db": "PACKETSTORM", "id": "162095" }, { "db": "PACKETSTORM", "id": "162255" }, { "db": "PACKETSTORM", "id": "161973" }, { "db": "PACKETSTORM", "id": "162117" }, { "db": "PACKETSTORM", "id": "161909" }, { "db": "NVD", "id": "CVE-2021-27363" } ] }, "id": "VAR-202103-0920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-386598" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:27:19.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "iscsi", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "title": "Red Hat: CVE-2021-27363", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-27363" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-27363 log" }, { "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-043", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-043" }, { "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-042", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-042" }, { "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-044", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-044" }, { "title": "Amazon Linux AMI: ALAS-2021-1487", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2021-1487" }, { "title": "Amazon Linux 2: ALAS2-2021-1616", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1616" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-001", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-001" }, { "title": "IBM: Security Bulletin: IBM Data Risk Manager is affected by multiple vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=e9d6f12dfd14652e2bb7e5c28ded162b" }, { "title": "Presentation2_Markdown", "trust": 0.1, "url": "https://github.com/aaronxie55/Presentation2_Markdown " }, { "title": "kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio", "trust": 0.1, "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio " }, { "title": "kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd", "trust": 0.1, "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd " }, { "title": "kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi", "trust": 0.1, "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi " }, { "title": "kernel-5.11.6-expSEHDsec-cgroup-virtio", "trust": 0.1, "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-cgroup-virtio " }, { "title": "kernel-5.11.6-expSEHDsec", "trust": 0.1, "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec " }, { "title": "", "trust": 0.1, "url": "https://github.com/teresaweber685/book_list " }, { "title": "cve_diff_checker", "trust": 0.1, "url": "https://github.com/lcatro/cve_diff_checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-27363" }, { "db": "JVNDB", "id": "JVNDB-2021-004361" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "db": "NVD", "id": "CVE-2021-27363" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://www.openwall.com/lists/oss-security/2021/03/06/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27363" }, { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20210409-0001/" }, { "trust": 1.2, "url": "http://packetstormsecurity.com/files/162117/kernel-live-patch-security-notice-lsn-0075-1.html" }, { "trust": 1.2, "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html" }, { "trust": 1.2, "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182716" }, { "trust": 1.2, "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27364" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27365" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2021-27363" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-27364" }, { "trust": 0.3, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-27365" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/aaronxie55/presentation2_markdown" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:1171" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:1070" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:1289" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-4889-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27170" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27171" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29372" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3444" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29374" }, { "trust": 0.1, "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1098.107" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1087.89" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1096.103~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-139.143" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1152.162" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1081.86" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-4883-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1095.108" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1090.99" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1110.122~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1095.108~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-206.238" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1124.138" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1096.103" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1110.122" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-139.143~16.04.1" } ], "sources": [ { "db": "VULHUB", "id": "VHN-386598" }, { "db": "VULMON", "id": "CVE-2021-27363" }, { "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "db": "PACKETSTORM", "id": "162156" }, { "db": "PACKETSTORM", "id": "162095" }, { "db": "PACKETSTORM", "id": "162255" }, { "db": "PACKETSTORM", "id": "161973" }, { "db": "PACKETSTORM", "id": "162117" }, { "db": "PACKETSTORM", "id": "161909" }, { "db": "NVD", "id": "CVE-2021-27363" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-386598" }, { "db": "VULMON", "id": "CVE-2021-27363" }, { "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "db": "PACKETSTORM", "id": "162156" }, { "db": "PACKETSTORM", "id": "162095" }, { "db": "PACKETSTORM", "id": "162255" }, { "db": "PACKETSTORM", "id": "161973" }, { "db": "PACKETSTORM", "id": "162117" }, { "db": "PACKETSTORM", "id": "161909" }, { "db": "NVD", "id": "CVE-2021-27363" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-07T00:00:00", "db": "VULHUB", "id": "VHN-386598" }, { "date": "2021-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-27363" }, { "date": "2021-11-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "date": "2021-04-13T15:49:34", "db": "PACKETSTORM", "id": "162156" }, { "date": "2021-04-06T14:35:33", "db": "PACKETSTORM", "id": "162095" }, { "date": "2021-04-20T16:32:38", "db": "PACKETSTORM", "id": "162255" }, { "date": "2021-03-25T14:09:02", "db": "PACKETSTORM", "id": "161973" }, { "date": "2021-04-07T20:34:19", "db": "PACKETSTORM", "id": "162117" }, { "date": "2021-03-22T15:29:43", "db": "PACKETSTORM", "id": "161909" }, { "date": "2021-03-07T04:15:13.330000", "db": "NVD", "id": "CVE-2021-27363" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-386598" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2021-27363" }, { "date": "2021-11-18T09:07:00", "db": "JVNDB", "id": "JVNDB-2021-004361" }, { "date": "2024-11-21T05:57:50.513000", "db": "NVD", "id": "CVE-2021-27363" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "161973" }, { "db": "PACKETSTORM", "id": "162117" }, { "db": "PACKETSTORM", "id": "161909" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux\u00a0Kernel\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-004361" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow", "sources": [ { "db": "PACKETSTORM", "id": "162156" }, { "db": "PACKETSTORM", "id": "162095" }, { "db": "PACKETSTORM", "id": "162255" } ], "trust": 0.3 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.