var-202105-1430
Vulnerability from variot
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients. NetBSD of An authentication vulnerability exists in the kernel.Service operation interruption (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: kernel-rt security and bug fix update Advisory ID: RHSA-2021:4140-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:4140 Issue date: 2021-11-09 CVE Names: CVE-2020-0427 CVE-2020-24502 CVE-2020-24503 CVE-2020-24504 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-26139 CVE-2020-26140 CVE-2020-26141 CVE-2020-26143 CVE-2020-26144 CVE-2020-26145 CVE-2020-26146 CVE-2020-26147 CVE-2020-29368 CVE-2020-29660 CVE-2020-36158 CVE-2020-36386 CVE-2021-0129 CVE-2021-3348 CVE-2021-3489 CVE-2021-3564 CVE-2021-3573 CVE-2021-3600 CVE-2021-3635 CVE-2021-3659 CVE-2021-3679 CVE-2021-3732 CVE-2021-20194 CVE-2021-20239 CVE-2021-23133 CVE-2021-28950 CVE-2021-28971 CVE-2021-29155 CVE-2021-29646 CVE-2021-29650 CVE-2021-31440 CVE-2021-31829 CVE-2021-31916 CVE-2021-33200 ==================================================================== 1. Summary:
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux NFV (v. 8) - x86_64 Red Hat Enterprise Linux RT (v. 8) - x86_64
- Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es): * kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427) * kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502) * kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503) * kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504) * kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586) * kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587) * kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588) * kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139) * kernel: accepting plaintext data frames in protected networks (CVE-2020-26140) * kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141) * kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143) * kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144) * kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145) * kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660) * kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158) * kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386) * kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129) * kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348) * kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489) * kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564) * kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573) * kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600) * kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679) * kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732) * kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194) * kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133) * kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950) * kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971) * kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155) * kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646) * kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650) * kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440) * kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829) * kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200) * kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146) * kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147) * kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368) * kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635) * kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659) * kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239) * kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)
- Solution:
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1875275 - Failure to enter full_nohz due to needless SCHED softirqs 1902412 - [kernel-rt] BUG: using smp_processor_id() in preemptible [00000000] code: kworker/u129:3/1367837 observed with blktests nvme-tcp tests 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check 1905747 - kernel-rt-debug: WARNING: possible circular locking dependency detected(&serv->sv_lock -> (softirq_ctrl.lock).lock) 1906522 - CVE-2020-29660 kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free 1912683 - CVE-2021-20194 kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() 1913348 - CVE-2020-36158 kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value 1919893 - CVE-2020-0427 kernel: out-of-bounds reads in pinctrl subsystem. 1921958 - CVE-2021-3348 kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c 1923636 - CVE-2021-20239 kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure 1930376 - CVE-2020-24504 kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers 1930379 - CVE-2020-24502 kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers 1930381 - CVE-2020-24503 kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers 1941762 - CVE-2021-28950 kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode 1941784 - CVE-2021-28971 kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c 1945345 - CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c 1945388 - CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS 1946965 - CVE-2021-31916 kernel: out of bounds array access in drivers/md/dm-ioctl.c 1948772 - CVE-2021-23133 kernel: Race condition in sctp_destroy_sock list_del 1951595 - CVE-2021-29155 kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory 1957788 - CVE-2021-31829 kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory 1959559 - CVE-2021-3489 kernel: Linux kernel eBPF RINGBUF map oversized allocation 1959642 - CVE-2020-24586 kernel: Fragmentation cache not cleared on reconnection 1959654 - CVE-2020-24587 kernel: Reassembling fragments encrypted under different keys 1959657 - CVE-2020-24588 kernel: wifi frame payload being parsed incorrectly as an L2 frame 1959663 - CVE-2020-26139 kernel: Forwarding EAPOL from unauthenticated wifi client 1960490 - CVE-2020-26140 kernel: accepting plaintext data frames in protected networks 1960492 - CVE-2020-26141 kernel: not verifying TKIP MIC of fragmented frames 1960496 - CVE-2020-26143 kernel: accepting fragmented plaintext frames in protected networks 1960498 - CVE-2020-26144 kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header 1960500 - CVE-2020-26145 kernel: accepting plaintext broadcast fragments as full frames 1960502 - CVE-2020-26146 kernel: reassembling encrypted fragments with non-consecutive packet numbers 1960504 - CVE-2020-26147 kernel: reassembling mixed encrypted/plaintext fragments 1964028 - CVE-2021-31440 kernel: local escalation of privileges in handling of eBPF programs 1964139 - CVE-2021-3564 kernel: double free in bluetooth subsystem when the HCI device initialization fails 1965038 - CVE-2021-0129 kernel: Improper access control in BlueZ may allow information disclosure vulnerability. 1965458 - CVE-2021-33200 kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier 1966578 - CVE-2021-3573 kernel: use-after-free in function hci_sock_bound_ioctl() 1969489 - CVE-2020-36386 kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c 1975949 - CVE-2021-3659 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c 1976946 - CVE-2021-3635 kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 1981954 - CVE-2021-3600 kernel: eBPF 32-bit source register truncation on div/mod 1989165 - CVE-2021-3679 kernel: DoS in rb_per_cpu_empty() 1995249 - CVE-2021-3732 kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files
- Package List:
Red Hat Enterprise Linux NFV (v. 8):
Source: kernel-rt-4.18.0-348.rt7.130.el8.src.rpm
x86_64: kernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm
Red Hat Enterprise Linux RT (v. 8):
Source: kernel-rt-4.18.0-348.rt7.130.el8.src.rpm
x86_64: kernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm kernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYYre49zjgjWX9erEAQhgMQ/7BqqKbZkZDUEDyUeAzIUcDicxQ3b0LM3D jM/Iyk+ZN1YCjlhovu1Y6vI2eYDzW9YLIsaPJUg4ZnliClQckKZM4wVqjb881j6g 2l1Pj+9r99OQsqOHoRMHC0XhwQjGITwG8YWYf8vRlEVsQHFGDz1PBK7rdgt4adMb olziPhDRSdfeTUETLOPzpRyePDv6UghcN841SBYXy1OnWROANm0gVAOTpFtqFgaC RJQJkGGdpaBnRkwyqPUG9NYPwLDkVxjNM/ku6eDfZ9D3zBKdULzxfGNOoMAIXvxS t8mC2quyy0HE6320Wj+q78kRUyvRBJHbNiYRKrmvkDrm2g6lxaB3d4ZN4uMq8wY8 7tMonZGZd8O3pnT2Lpr71pYSb5YC8TceYshMQHU+m40v+ByWQuuOvCXM636/iphr wgv7a6fvku5H/XVQs34u4RldobhDmEdwPd4vQ+IfoSz7uouBwWjD9Fkm1JBeZ3oC 0A/D2rLT+uCTszWqzp9Rz61iMKIqEiLPirgVNnWdYskv0HO+2ePYiXjGdSRqXnIT q1ypdKCqHYHuDdxk468fH0bToxjbjpbVS43Vkhzof44MqS+iGotpRUnOZeWjmKRp 8Fe3BHS4cXWkqrxzMcHMVHP1/7XV82o4RgqDQvnvxo71DOvZxfDwEzyTUHF1LiYZ nbdCAvai1OE=/lv0 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bugs fixed (https://bugzilla.redhat.com/):
2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
- ========================================================================== Ubuntu Security Notice USN-5343-1 March 22, 2022
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty
Details:
Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492)
It was discovered that the aufs file system in the Linux kernel did not properly restrict mount namespaces, when mounted with the non-default allow_userns option set. A local attacker could use this to gain administrative privileges. (CVE-2016-2853)
It was discovered that the aufs file system in the Linux kernel did not properly maintain POSIX ACL xattr data, when mounted with the non-default allow_userns option. A local attacker could possibly use this to gain elevated privileges. (CVE-2016-2854)
It was discovered that the f2fs file system in the Linux kernel did not properly validate metadata in some situations. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19449)
It was discovered that the XFS file system implementation in the Linux kernel did not properly validate meta data in some circumstances. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service. (CVE-2020-12655)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-25670)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the Linux kernel did not properly deallocate memory in certain error situations. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2020-25671, CVE-2020-25672)
Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the Linux kernel did not properly handle error conditions in some situations, leading to an infinite loop. A local attacker could use this to cause a denial of service. (CVE-2020-25673)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled EAPOL frames from unauthenticated senders. A physically proximate attacker could inject malicious packets to cause a denial of service (system crash). (CVE-2020-26139)
Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147)
It was discovered that the BR/EDR pin-code pairing procedure in the Linux kernel was vulnerable to an impersonation attack. A physically proximate attacker could possibly use this to pair to a device without knowledge of the pin-code. (CVE-2020-26555)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)
It was discovered that the FUSE user space file system implementation in the Linux kernel did not properly handle bad inodes in some situations. A local attacker could possibly use this to cause a denial of service. (CVE-2020-36322)
It was discovered that the Infiniband RDMA userspace connection manager implementation in the Linux kernel contained a race condition leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possible execute arbitrary code. (CVE-2020-36385)
It was discovered that the DRM subsystem in the Linux kernel contained double-free vulnerabilities. A privileged attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-20292)
It was discovered that a race condition existed in the timer implementation in the Linux kernel. A privileged attacker could use this to cause a denial of service. (CVE-2021-20317)
Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the nfc implementation in the Linux kernel. A privileged local attacker could use this issue to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23134)
It was discovered that the Xen paravirtualization backend in the Linux kernel did not properly deallocate memory in some situations. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-28688)
It was discovered that the RPA PCI Hotplug driver implementation in the Linux kernel did not properly handle device name writes via sysfs, leading to a buffer overflow. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-28972)
It was discovered that a race condition existed in the netfilter subsystem of the Linux kernel when replacing tables. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-29650)
It was discovered that a race condition in the kernel Bluetooth subsystem could lead to use-after-free of slab objects. An attacker could use this issue to possibly execute arbitrary code. (CVE-2021-32399)
It was discovered that the CIPSO implementation in the Linux kernel did not properly perform reference counting in some situations, leading to use- after-free vulnerabilities. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)
Asaf Modelevsky discovered that the Intel(R) Ethernet ixgbe driver for the Linux kernel did not properly validate large MTU requests from Virtual Function (VF) devices. A local attacker could possibly use this to cause a denial of service. (CVE-2021-33098)
Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693)
马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3483)
It was discovered that an out-of-bounds (OOB) memory access flaw existed in the f2fs module of the Linux kernel. A local attacker could use this issue to cause a denial of service (system crash). (CVE-2021-3506)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device detach events, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3573)
Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612)
It was discovered that the tracing subsystem in the Linux kernel did not properly keep track of per-cpu ring buffer state. A privileged attacker could use this to cause a denial of service. (CVE-2021-3679)
It was discovered that the Virtio console implementation in the Linux kernel did not properly validate input lengths in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-38160)
It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly compute the access permissions for shadow pages in some situations. A local attacker could use this to cause a denial of service. (CVE-2021-38198)
It was discovered that the MAX-3421 host USB device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-38204)
It was discovered that the NFC implementation in the Linux kernel did not properly handle failed connect events leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2021-38208)
It was discovered that the configfs interface for USB gadgets in the Linux kernel contained a race condition. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2021-39648)
It was discovered that the ext4 file system in the Linux kernel contained a race condition when writing xattrs to an inode. A local attacker could use this to cause a denial of service or possibly gain administrative privileges. (CVE-2021-40490)
It was discovered that the 6pack network protocol driver in the Linux kernel did not properly perform validation checks. A privileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-42008)
It was discovered that the ISDN CAPI implementation in the Linux kernel contained a race condition in certain situations that could trigger an array out-of-bounds bug. A privileged local attacker could possibly use this to cause a denial of service or execute arbitrary code. (CVE-2021-43389)
It was discovered that the Phone Network protocol (PhoNet) implementation in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2021-45095)
Wenqing Liu discovered that the f2fs file system in the Linux kernel did not properly validate the last xattr entry in an inode. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-45469)
Amit Klein discovered that the IPv6 implementation in the Linux kernel could disclose internal state in some situations. An attacker could possibly use this to expose sensitive information. (CVE-2021-45485)
It was discovered that the per cpu memory allocator in the Linux kernel could report kernel pointers via dmesg. An attacker could use this to expose sensitive information or in conjunction with another kernel vulnerability. (CVE-2018-5995)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: linux-image-4.4.0-1103-kvm 4.4.0-1103.112 linux-image-4.4.0-1138-aws 4.4.0-1138.152 linux-image-4.4.0-222-generic 4.4.0-222.255 linux-image-4.4.0-222-lowlatency 4.4.0-222.255 linux-image-aws 4.4.0.1138.143 linux-image-generic 4.4.0.222.229 linux-image-kvm 4.4.0.1103.101 linux-image-lowlatency 4.4.0.222.229 linux-image-virtual 4.4.0.222.229
Ubuntu 14.04 ESM: linux-image-4.4.0-1102-aws 4.4.0-1102.107 linux-image-4.4.0-222-generic 4.4.0-222.255~14.04.1 linux-image-4.4.0-222-lowlatency 4.4.0-222.255~14.04.1 linux-image-aws 4.4.0.1102.100 linux-image-generic-lts-xenial 4.4.0.222.193 linux-image-lowlatency-lts-xenial 4.4.0.222.193 linux-image-virtual-lts-xenial 4.4.0.222.193
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://ubuntu.com/security/notices/USN-5343-1 CVE-2016-2853, CVE-2016-2854, CVE-2018-5995, CVE-2019-19449, CVE-2020-12655, CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2020-26139, CVE-2020-26147, CVE-2020-26555, CVE-2020-26558, CVE-2020-36322, CVE-2020-36385, CVE-2021-0129, CVE-2021-20292, CVE-2021-20317, CVE-2021-23134, CVE-2021-28688, CVE-2021-28972, CVE-2021-29650, CVE-2021-32399, CVE-2021-33033, CVE-2021-33034, CVE-2021-33098, CVE-2021-34693, CVE-2021-3483, CVE-2021-3506, CVE-2021-3564, CVE-2021-3573, CVE-2021-3612, CVE-2021-3679, CVE-2021-38160, CVE-2021-38198, CVE-2021-38204, CVE-2021-38208, CVE-2021-39648, CVE-2021-40490, CVE-2021-42008, CVE-2021-43389, CVE-2021-45095, CVE-2021-45469, CVE-2021-45485, CVE-2022-0492 . This update provides the corresponding updates for the Linux KVM kernel for Ubuntu 21.04. Solution:
For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:
https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html
- Bugs fixed (https://bugzilla.redhat.com/):
1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment
- JIRA issues fixed (https://issues.jboss.org/):
LOG-1168 - Disable hostname verification in syslog TLS settings
LOG-1235 - Using HTTPS without a secret does not translate into the correct 'scheme' value in Fluentd
LOG-1375 - ssl_ca_cert should be optional
LOG-1378 - CLO should support sasl_plaintext(Password over http)
LOG-1392 - In fluentd config, flush_interval can't be set with flush_mode=immediate
LOG-1494 - Syslog output is serializing json incorrectly
LOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server
LOG-1575 - Rejected by Elasticsearch and unexpected json-parsing
LOG-1735 - Regression introducing flush_at_shutdown
LOG-1774 - The collector logs should be excluded in fluent.conf
LOG-1776 - fluentd total_limit_size sets value beyond available space
LOG-1822 - OpenShift Alerting Rules Style-Guide Compliance
LOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled
LOG-1862 - Unsupported kafka parameters when enabled Kafka SASL
LOG-1903 - Fix the Display of ClusterLogging type in OLM
LOG-1911 - CLF API changes to Opt-in to multiline error detection
LOG-1918 - Alert FluentdNodeDown
always firing
LOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding
6
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202105-1430", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "meraki mr12", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-75", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "meraki mx67cw", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1852", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset wi-fi 6 ax200", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "aironet 1542i", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr33", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-200", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "aironet 2800", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9105", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset wireless 7265 \\", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "1109-4p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-235", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "catalyst iw6300 dcw", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ac 9560", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "webex room 55", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex dx80", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr42", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset wi-fi 6e ax210", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "meraki mr55", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-260", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "proset ac 9260", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "catalyst 9130axe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ir829gw-lte-ga-zk9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex dx70", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1832", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr36", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-110", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "aironet 1810", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr44", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9120", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet ap803", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "esw6300", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr20", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr70", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "w-68", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "catalyst iw6300", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "killer wi-fi 6e ax1675", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "proset ac 3168", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "proset ac 9461", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "meraki mx68cw", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex board 85s", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1572", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex room 70 dual", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "killer ac 1550", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "o-90", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "catalyst 9120 ap", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mx65w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1810w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9105axw", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset ac 8260", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "meraki mr53", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-230", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "meraki mr45", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst iw6300 ac", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr84", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr76", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr86", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-130", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "w-118", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "ir829gw-lte-vz-ak9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 3800e", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "1100-8p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex board 55s", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ir829-2lte-ea-ak9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset ac 9462", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ip phone 6861", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 3702", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9130axi", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9120axi", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ip phone 8861", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mx67w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ac 8265", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "catalyst 9124axi", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex room kit mini", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset ac 9560", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "aironet 1702", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9124axd", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki z3c", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ac 9260", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "aironet iw3702", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr34", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 3800", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9120axp", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki gr60", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr26", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "1101-4p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr72", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-65", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "wi-fi 6 ax201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "webex room 70 dual g2", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst iw6300 dc", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 4800", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9115axi", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr62", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mx68w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "wi-fi 6 ax200", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "c-100", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "ir829-2lte-ea-bk9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ir829gw-lte-na-ak9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9124", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 2800e", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1552h", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9117axi", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 3800p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9105axi", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1842", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ir829gw-lte-ga-ek9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ip phone 8865", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9117 ap", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr46", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr32", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1815i", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex room 70 single g2", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1815", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr74", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ir829gw-lte-ga-ck9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ip phone 8832", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr46e", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex room 70 single", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9117", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr53e", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex room 55 dual", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9130", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "1100", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-120", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "proset ac 3165", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "meraki gr10", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "killer wi-fi 6 ax1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "webex room 70", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ir829-2lte-ea-ek9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9120axe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex board 70s", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ir829gw-lte-ga-sk9", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ip phone 8821", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset ac 8265", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "aironet 1800i", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 3800i", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr30h", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 2702", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex board 55", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1800", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mx64w", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "webex room kit", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9115axe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr42e", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "c-250", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "aironet 1532", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr52", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "proset wi-fi 6 ax201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "webex board 70", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "1100-4p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "o-105", "scope": "eq", "trust": 1.0, "vendor": "arista", "version": null }, { "model": "aironet 1542d", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9130 ap", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "ac 8260", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "catalyst 9115", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "1109-2p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki mr66", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 2800i", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "meraki z3", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "netbsd", "scope": "eq", "trust": 1.0, "vendor": "netbsd", "version": "7.1" }, { "model": "meraki mr56", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "catalyst 9115 ap", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "aironet 1552", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nec ai accelerator", "scope": null, "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": null }, { "model": "aterm", "scope": "eq", "trust": 0.8, "vendor": "\u65e5\u672c\u96fb\u6c17", "version": null }, { "model": "netbsd", "scope": null, "trust": 0.8, "vendor": "netbsd", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "NVD", "id": "CVE-2020-26139" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "166417" }, { "db": "PACKETSTORM", "id": "163249" }, { "db": "PACKETSTORM", "id": "163251" }, { "db": "PACKETSTORM", "id": "163291" }, { "db": "PACKETSTORM", "id": "163301" }, { "db": "PACKETSTORM", "id": "163599" } ], "trust": 0.6 }, "cve": "CVE-2020-26139", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "exploitabilityScore": 5.5, "id": "CVE-2020-26139", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.6, "id": "CVE-2020-26139", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-26139", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-26139", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-26139", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-202105-649", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-26139", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-26139" }, { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "CNNVD", "id": "CNNVD-202105-649" }, { "db": "NVD", "id": "CVE-2020-26139" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients. NetBSD of An authentication vulnerability exists in the kernel.Service operation interruption (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: kernel-rt security and bug fix update\nAdvisory ID: RHSA-2021:4140-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:4140\nIssue date: 2021-11-09\nCVE Names: CVE-2020-0427 CVE-2020-24502 CVE-2020-24503\n CVE-2020-24504 CVE-2020-24586 CVE-2020-24587\n CVE-2020-24588 CVE-2020-26139 CVE-2020-26140\n CVE-2020-26141 CVE-2020-26143 CVE-2020-26144\n CVE-2020-26145 CVE-2020-26146 CVE-2020-26147\n CVE-2020-29368 CVE-2020-29660 CVE-2020-36158\n CVE-2020-36386 CVE-2021-0129 CVE-2021-3348\n CVE-2021-3489 CVE-2021-3564 CVE-2021-3573\n CVE-2021-3600 CVE-2021-3635 CVE-2021-3659\n CVE-2021-3679 CVE-2021-3732 CVE-2021-20194\n CVE-2021-20239 CVE-2021-23133 CVE-2021-28950\n CVE-2021-28971 CVE-2021-29155 CVE-2021-29646\n CVE-2021-29650 CVE-2021-31440 CVE-2021-31829\n CVE-2021-31916 CVE-2021-33200\n====================================================================\n1. Summary:\n\nAn update for kernel-rt is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux NFV (v. 8) - x86_64\nRed Hat Enterprise Linux RT (v. 8) - x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter\ndrivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810\nAdapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810\nAdapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys\n(CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame\n(CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client\n(CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks\n(CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks\n(CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042\nheader (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames\n(CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a\nread-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a\nlong SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt()\n(CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure\nvulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation\n(CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device\ninitialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user\nnamespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()\n(CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually\nfinds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against\nspeculatively out-of-bounds loads can be bypassed to leak content of kernel\nmemory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function\n(CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table\nvalue in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs\n(CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer\narithmetic can be bypassed to leak content of kernel memory\n(CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits\nfor pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet\nnumbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write\naccess because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information\nDisclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c\n(CVE-2021-31916)\n\n4. Solution:\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.5 Release Notes linked from the References section. \n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1875275 - Failure to enter full_nohz due to needless SCHED softirqs\n1902412 - [kernel-rt] BUG: using smp_processor_id() in preemptible [00000000] code: kworker/u129:3/1367837 observed with blktests nvme-tcp tests\n1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check\n1905747 - kernel-rt-debug: WARNING: possible circular locking dependency detected(\u0026serv-\u003esv_lock -\u003e (softirq_ctrl.lock).lock)\n1906522 - CVE-2020-29660 kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free\n1912683 - CVE-2021-20194 kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()\n1913348 - CVE-2020-36158 kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value\n1919893 - CVE-2020-0427 kernel: out-of-bounds reads in pinctrl subsystem. \n1921958 - CVE-2021-3348 kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c\n1923636 - CVE-2021-20239 kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure\n1930376 - CVE-2020-24504 kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers\n1930379 - CVE-2020-24502 kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers\n1930381 - CVE-2020-24503 kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers\n1941762 - CVE-2021-28950 kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode\n1941784 - CVE-2021-28971 kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c\n1945345 - CVE-2021-29646 kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c\n1945388 - CVE-2021-29650 kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS\n1946965 - CVE-2021-31916 kernel: out of bounds array access in drivers/md/dm-ioctl.c\n1948772 - CVE-2021-23133 kernel: Race condition in sctp_destroy_sock list_del\n1951595 - CVE-2021-29155 kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory\n1957788 - CVE-2021-31829 kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory\n1959559 - CVE-2021-3489 kernel: Linux kernel eBPF RINGBUF map oversized allocation\n1959642 - CVE-2020-24586 kernel: Fragmentation cache not cleared on reconnection\n1959654 - CVE-2020-24587 kernel: Reassembling fragments encrypted under different keys\n1959657 - CVE-2020-24588 kernel: wifi frame payload being parsed incorrectly as an L2 frame\n1959663 - CVE-2020-26139 kernel: Forwarding EAPOL from unauthenticated wifi client\n1960490 - CVE-2020-26140 kernel: accepting plaintext data frames in protected networks\n1960492 - CVE-2020-26141 kernel: not verifying TKIP MIC of fragmented frames\n1960496 - CVE-2020-26143 kernel: accepting fragmented plaintext frames in protected networks\n1960498 - CVE-2020-26144 kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header\n1960500 - CVE-2020-26145 kernel: accepting plaintext broadcast fragments as full frames\n1960502 - CVE-2020-26146 kernel: reassembling encrypted fragments with non-consecutive packet numbers\n1960504 - CVE-2020-26147 kernel: reassembling mixed encrypted/plaintext fragments\n1964028 - CVE-2021-31440 kernel: local escalation of privileges in handling of eBPF programs\n1964139 - CVE-2021-3564 kernel: double free in bluetooth subsystem when the HCI device initialization fails\n1965038 - CVE-2021-0129 kernel: Improper access control in BlueZ may allow information disclosure vulnerability. \n1965458 - CVE-2021-33200 kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier\n1966578 - CVE-2021-3573 kernel: use-after-free in function hci_sock_bound_ioctl()\n1969489 - CVE-2020-36386 kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c\n1975949 - CVE-2021-3659 kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c\n1976946 - CVE-2021-3635 kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50\n1981954 - CVE-2021-3600 kernel: eBPF 32-bit source register truncation on div/mod\n1989165 - CVE-2021-3679 kernel: DoS in rb_per_cpu_empty()\n1995249 - CVE-2021-3732 kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files\n\n6. Package List:\n\nRed Hat Enterprise Linux NFV (v. 8):\n\nSource:\nkernel-rt-4.18.0-348.rt7.130.el8.src.rpm\n\nx86_64:\nkernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-kvm-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\n\nRed Hat Enterprise Linux RT (v. 8):\n\nSource:\nkernel-rt-4.18.0-348.rt7.130.el8.src.rpm\n\nx86_64:\nkernel-rt-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-core-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debug-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-debuginfo-common-x86_64-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-devel-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-4.18.0-348.rt7.130.el8.x86_64.rpm\nkernel-rt-modules-extra-4.18.0-348.rt7.130.el8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nnbdCAvai1OE=/lv0\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Bugs fixed (https://bugzilla.redhat.com/):\n\n2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value\n\n5. ==========================================================================\nUbuntu Security Notice USN-5343-1\nMarch 22, 2022\n\nlinux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 ESM\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n- linux-aws: Linux kernel for Amazon Web Services (AWS) systems\n- linux-kvm: Linux kernel for cloud environments\n- linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty\n\nDetails:\n\nYiqi Sun and Kevin Wang discovered that the cgroups implementation in the\nLinux kernel did not properly restrict access to the cgroups v1\nrelease_agent feature. A local attacker could use this to gain\nadministrative privileges. (CVE-2022-0492)\n\nIt was discovered that the aufs file system in the Linux kernel did not\nproperly restrict mount namespaces, when mounted with the non-default\nallow_userns option set. A local attacker could use this to gain\nadministrative privileges. (CVE-2016-2853)\n\nIt was discovered that the aufs file system in the Linux kernel did not\nproperly maintain POSIX ACL xattr data, when mounted with the non-default\nallow_userns option. A local attacker could possibly use this to gain\nelevated privileges. (CVE-2016-2854)\n\nIt was discovered that the f2fs file system in the Linux kernel did not\nproperly validate metadata in some situations. An attacker could use this\nto construct a malicious f2fs image that, when mounted and operated on,\ncould cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-19449)\n\nIt was discovered that the XFS file system implementation in the Linux\nkernel did not properly validate meta data in some circumstances. An\nattacker could use this to construct a malicious XFS image that, when\nmounted, could cause a denial of service. (CVE-2020-12655)\n\nKiyin (\u5c39\u4eae) discovered that the NFC LLCP protocol implementation in the\nLinux kernel contained a reference counting error. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2020-25670)\n\nKiyin (\u5c39\u4eae) discovered that the NFC LLCP protocol implementation in the\nLinux kernel did not properly deallocate memory in certain error\nsituations. A local attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)\n\nKiyin (\u5c39\u4eae) discovered that the NFC LLCP protocol implementation in the\nLinux kernel did not properly handle error conditions in some situations,\nleading to an infinite loop. A local attacker could use this to cause a\ndenial of service. (CVE-2020-25673)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation\nincorrectly handled EAPOL frames from unauthenticated senders. A physically\nproximate attacker could inject malicious packets to cause a denial of\nservice (system crash). (CVE-2020-26139)\n\nMathy Vanhoef discovered that the Linux kernel\u2019s WiFi implementation could\nreassemble mixed encrypted and plaintext fragments. A physically proximate\nattacker could possibly use this issue to inject packets or exfiltrate\nselected fragments. (CVE-2020-26147)\n\nIt was discovered that the BR/EDR pin-code pairing procedure in the Linux\nkernel was vulnerable to an impersonation attack. A physically proximate\nattacker could possibly use this to pair to a device without knowledge of\nthe pin-code. (CVE-2020-26555)\n\nIt was discovered that the bluetooth subsystem in the Linux kernel did not\nproperly perform access control. An authenticated attacker could possibly\nuse this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)\n\nIt was discovered that the FUSE user space file system implementation in\nthe Linux kernel did not properly handle bad inodes in some situations. A\nlocal attacker could possibly use this to cause a denial of service. \n(CVE-2020-36322)\n\nIt was discovered that the Infiniband RDMA userspace connection manager\nimplementation in the Linux kernel contained a race condition leading to a\nuse-after-free vulnerability. A local attacker could use this to cause a\ndenial of service (system crash) or possible execute arbitrary code. \n(CVE-2020-36385)\n\nIt was discovered that the DRM subsystem in the Linux kernel contained\ndouble-free vulnerabilities. A privileged attacker could possibly use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2021-20292)\n\nIt was discovered that a race condition existed in the timer implementation\nin the Linux kernel. A privileged attacker could use this to cause a denial\nof service. (CVE-2021-20317)\n\nOr Cohen and Nadav Markus discovered a use-after-free vulnerability in the\nnfc implementation in the Linux kernel. A privileged local attacker could\nuse this issue to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-23134)\n\nIt was discovered that the Xen paravirtualization backend in the Linux\nkernel did not properly deallocate memory in some situations. A local\nattacker could use this to cause a denial of service (memory exhaustion). \n(CVE-2021-28688)\n\nIt was discovered that the RPA PCI Hotplug driver implementation in the\nLinux kernel did not properly handle device name writes via sysfs, leading\nto a buffer overflow. A privileged attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code. \n(CVE-2021-28972)\n\nIt was discovered that a race condition existed in the netfilter subsystem\nof the Linux kernel when replacing tables. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2021-29650)\n\nIt was discovered that a race condition in the kernel Bluetooth subsystem\ncould lead to use-after-free of slab objects. An attacker could use this\nissue to possibly execute arbitrary code. (CVE-2021-32399)\n\nIt was discovered that the CIPSO implementation in the Linux kernel did not\nproperly perform reference counting in some situations, leading to use-\nafter-free vulnerabilities. An attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2021-33034)\n\nAsaf Modelevsky discovered that the Intel(R) Ethernet ixgbe driver for the\nLinux kernel did not properly validate large MTU requests from Virtual\nFunction (VF) devices. A local attacker could possibly use this to cause a\ndenial of service. (CVE-2021-33098)\n\nNorbert Slusarek discovered that the CAN broadcast manger (bcm) protocol\nimplementation in the Linux kernel did not properly initialize memory in\nsome situations. A local attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2021-34693)\n\n\u9a6c\u54f2\u5b87 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in\nthe Linux kernel did not properly perform reference counting in some\nsituations, leading to a use-after-free vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-3483)\n\nIt was discovered that an out-of-bounds (OOB) memory access flaw existed in\nthe f2fs module of the Linux kernel. A local attacker could use this issue\nto cause a denial of service (system crash). (CVE-2021-3506)\n\nIt was discovered that the bluetooth subsystem in the Linux kernel did not\nproperly handle HCI device initialization failure, leading to a double-free\nvulnerability. An attacker could use this to cause a denial of service or\npossibly execute arbitrary code. (CVE-2021-3564)\n\nIt was discovered that the bluetooth subsystem in the Linux kernel did not\nproperly handle HCI device detach events, leading to a use-after-free\nvulnerability. An attacker could use this to cause a denial of service or\npossibly execute arbitrary code. (CVE-2021-3573)\n\nMurray McAllister discovered that the joystick device interface in the\nLinux kernel did not properly validate data passed via an ioctl(). A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code on systems with a joystick device\nregistered. (CVE-2021-3612)\n\nIt was discovered that the tracing subsystem in the Linux kernel did not\nproperly keep track of per-cpu ring buffer state. A privileged attacker\ncould use this to cause a denial of service. (CVE-2021-3679)\n\nIt was discovered that the Virtio console implementation in the Linux\nkernel did not properly validate input lengths in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2021-38160)\n\nIt was discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly compute the access permissions for shadow pages in\nsome situations. A local attacker could use this to cause a denial of\nservice. (CVE-2021-38198)\n\nIt was discovered that the MAX-3421 host USB device driver in the Linux\nkernel did not properly handle device removal events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2021-38204)\n\nIt was discovered that the NFC implementation in the Linux kernel did not\nproperly handle failed connect events leading to a NULL pointer\ndereference. A local attacker could use this to cause a denial of service. \n(CVE-2021-38208)\n\nIt was discovered that the configfs interface for USB gadgets in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto expose sensitive information (kernel memory). (CVE-2021-39648)\n\nIt was discovered that the ext4 file system in the Linux kernel contained a\nrace condition when writing xattrs to an inode. A local attacker could use\nthis to cause a denial of service or possibly gain administrative\nprivileges. (CVE-2021-40490)\n\nIt was discovered that the 6pack network protocol driver in the Linux\nkernel did not properly perform validation checks. A privileged attacker\ncould use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2021-42008)\n\nIt was discovered that the ISDN CAPI implementation in the Linux kernel\ncontained a race condition in certain situations that could trigger an\narray out-of-bounds bug. A privileged local attacker could possibly use\nthis to cause a denial of service or execute arbitrary code. \n(CVE-2021-43389)\n\nIt was discovered that the Phone Network protocol (PhoNet) implementation\nin the Linux kernel did not properly perform reference counting in some\nerror conditions. A local attacker could possibly use this to cause a\ndenial of service (memory exhaustion). (CVE-2021-45095)\n\nWenqing Liu discovered that the f2fs file system in the Linux kernel did\nnot properly validate the last xattr entry in an inode. An attacker could\nuse this to construct a malicious f2fs image that, when mounted and\noperated on, could cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-45469)\n\nAmit Klein discovered that the IPv6 implementation in the Linux kernel\ncould disclose internal state in some situations. An attacker could\npossibly use this to expose sensitive information. (CVE-2021-45485)\n\nIt was discovered that the per cpu memory allocator in the Linux kernel\ncould report kernel pointers via dmesg. An attacker could use this to\nexpose sensitive information or in conjunction with another kernel\nvulnerability. (CVE-2018-5995)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 ESM:\n linux-image-4.4.0-1103-kvm 4.4.0-1103.112\n linux-image-4.4.0-1138-aws 4.4.0-1138.152\n linux-image-4.4.0-222-generic 4.4.0-222.255\n linux-image-4.4.0-222-lowlatency 4.4.0-222.255\n linux-image-aws 4.4.0.1138.143\n linux-image-generic 4.4.0.222.229\n linux-image-kvm 4.4.0.1103.101\n linux-image-lowlatency 4.4.0.222.229\n linux-image-virtual 4.4.0.222.229\n\nUbuntu 14.04 ESM:\n linux-image-4.4.0-1102-aws 4.4.0-1102.107\n linux-image-4.4.0-222-generic 4.4.0-222.255~14.04.1\n linux-image-4.4.0-222-lowlatency 4.4.0-222.255~14.04.1\n linux-image-aws 4.4.0.1102.100\n linux-image-generic-lts-xenial 4.4.0.222.193\n linux-image-lowlatency-lts-xenial 4.4.0.222.193\n linux-image-virtual-lts-xenial 4.4.0.222.193\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://ubuntu.com/security/notices/USN-5343-1\n CVE-2016-2853, CVE-2016-2854, CVE-2018-5995, CVE-2019-19449,\n CVE-2020-12655, CVE-2020-25670, CVE-2020-25671, CVE-2020-25672,\n CVE-2020-25673, CVE-2020-26139, CVE-2020-26147, CVE-2020-26555,\n CVE-2020-26558, CVE-2020-36322, CVE-2020-36385, CVE-2021-0129,\n CVE-2021-20292, CVE-2021-20317, CVE-2021-23134, CVE-2021-28688,\n CVE-2021-28972, CVE-2021-29650, CVE-2021-32399, CVE-2021-33033,\n CVE-2021-33034, CVE-2021-33098, CVE-2021-34693, CVE-2021-3483,\n CVE-2021-3506, CVE-2021-3564, CVE-2021-3573, CVE-2021-3612,\n CVE-2021-3679, CVE-2021-38160, CVE-2021-38198, CVE-2021-38204,\n CVE-2021-38208, CVE-2021-39648, CVE-2021-40490, CVE-2021-42008,\n CVE-2021-43389, CVE-2021-45095, CVE-2021-45469, CVE-2021-45485,\n CVE-2022-0492\n. \nThis update provides the corresponding updates for the Linux KVM\nkernel for Ubuntu 21.04. Solution:\n\nFor OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply\nthis update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1168 - Disable hostname verification in syslog TLS settings\nLOG-1235 - Using HTTPS without a secret does not translate into the correct \u0027scheme\u0027 value in Fluentd\nLOG-1375 - ssl_ca_cert should be optional\nLOG-1378 - CLO should support sasl_plaintext(Password over http)\nLOG-1392 - In fluentd config, flush_interval can\u0027t be set with flush_mode=immediate\nLOG-1494 - Syslog output is serializing json incorrectly\nLOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server\nLOG-1575 - Rejected by Elasticsearch and unexpected json-parsing\nLOG-1735 - Regression introducing flush_at_shutdown \nLOG-1774 - The collector logs should be excluded in fluent.conf\nLOG-1776 - fluentd total_limit_size sets value beyond available space\nLOG-1822 - OpenShift Alerting Rules Style-Guide Compliance\nLOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled\nLOG-1862 - Unsupported kafka parameters when enabled Kafka SASL\nLOG-1903 - Fix the Display of ClusterLogging type in OLM\nLOG-1911 - CLF API changes to Opt-in to multiline error detection\nLOG-1918 - Alert `FluentdNodeDown` always firing \nLOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding\n\n6", "sources": [ { "db": "NVD", "id": "CVE-2020-26139" }, { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "VULMON", "id": "CVE-2020-26139" }, { "db": "PACKETSTORM", "id": "164875" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "166417" }, { "db": "PACKETSTORM", "id": "163249" }, { "db": "PACKETSTORM", "id": "163251" }, { "db": "PACKETSTORM", "id": "163291" }, { "db": "PACKETSTORM", "id": "163301" }, { "db": "PACKETSTORM", "id": "163599" }, { "db": "PACKETSTORM", "id": "164967" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-26139", "trust": 4.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2021/05/11/12", "trust": 2.5 }, { "db": "SIEMENS", "id": "SSA-913875", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU93485736", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2021-006884", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-22-104-04", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164875", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "166417", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163249", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163291", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163599", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.1628", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.4254", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2453", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1715", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2216", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2876", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2079", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3905", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.1225", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2368", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2290", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1899", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3825", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2249", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2136", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021051915", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021051814", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021051212", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021060143", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021100407", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-236-01", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-61212", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202105-649", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-26139", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "165296", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163251", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163301", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164967", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-26139" }, { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "PACKETSTORM", "id": "164875" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "166417" }, { "db": "PACKETSTORM", "id": "163249" }, { "db": "PACKETSTORM", "id": "163251" }, { "db": "PACKETSTORM", "id": "163291" }, { "db": "PACKETSTORM", "id": "163301" }, { "db": "PACKETSTORM", "id": "163599" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "CNNVD", "id": "CNNVD-202105-649" }, { "db": "NVD", "id": "CVE-2020-26139" } ] }, "id": "VAR-202105-1430", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5546143666666666 }, "last_update_date": "2024-11-29T21:55:35.633000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page NEC NEC Product security information", "trust": 0.8, "url": "http://www.netbsd.org/" }, { "title": "NetBSD Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=152353" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-26139 log" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-004", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-004" }, { "title": "Ubuntu Security Notice: USN-5343-1: Linux kernel vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5343-1" }, { "title": "Cisco: Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-wifi-faf-22epcEWu" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.10-2022-002", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.10-2022-002" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2020-26139 " }, { "title": "", "trust": 0.1, "url": "https://github.com/kali973/fragAttacks " }, { "title": "fragattacks", "trust": 0.1, "url": "https://github.com/vanhoefm/fragattacks " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-26139" }, { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "CNNVD", "id": "CNNVD-202105-649" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.0 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "NVD", "id": "CVE-2020-26139" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.openwall.com/lists/oss-security/2021/05/11/12" }, { "trust": 2.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-wifi-faf-22epcewu" }, { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26139" }, { "trust": 1.7, "url": "https://www.fragattacks.com" }, { "trust": 1.7, "url": "https://github.com/vanhoefm/fragattacks/blob/master/summary.md" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf" }, { "trust": 1.7, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63" }, { "trust": 0.9, "url": "https://access.redhat.com/security/cve/cve-2020-26139" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93485736/" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26147" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24586" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24587" }, { "trust": 0.6, "url": "https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-61212" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2216" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2876" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2021-10-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3905" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1628" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3825" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-104-04" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2368" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021100407" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-236-01" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021051814" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/wi-fi-devices-multiple-vulnerabilities-via-fragattacks-35386" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021051915" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021060143" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021051212" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1225" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163291/ubuntu-security-notice-usn-5000-2.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164875/red-hat-security-advisory-2021-4140-02.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1899" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2249" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/166417/ubuntu-security-notice-usn-5343-1.html" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163599/ubuntu-security-notice-usn-5018-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163249/ubuntu-security-notice-usn-4997-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2136" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4254" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2079" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2453" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2290" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210513-01-fragattacks-cn" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.1715" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24588" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26145" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23133" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26141" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-32399" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23134" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33034" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33200" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31829" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3506" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3609" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-26143" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-24504" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3600" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-20239" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-26144" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3679" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-36158" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3635" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-31829" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-26145" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-36386" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-33200" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-29650" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0427" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3573" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-29368" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-20194" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-24586" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-26147" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-31916" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-26141" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3348" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-28950" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-24588" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-26140" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-31440" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-26146" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-29646" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-29155" }, { "trust": 0.3, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3732" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-0129" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3489" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24503" }, { "trust": 0.3, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-29660" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-24587" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-28971" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-24502" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-24503" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3659" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3564" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-0427" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-23133" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24502" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31440" }, { "trust": 0.2, "url": "https://ubuntu.com/security/notices/usn-5343-1" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29155" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-27777" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16135" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3200" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35448" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25013" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20284" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25012" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35522" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5827" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35524" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20673" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25013" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25009" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-27645" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-33574" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3487" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-13435" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-5827" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24370" }, { "trust": 0.2, "url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14145" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-13751" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10001" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25014" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-19603" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14145" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25012" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35521" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-35942" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-17594" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36312" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24370" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3572" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-12762" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36086" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3778" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13750" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13751" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22898" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12762" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-16135" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36084" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-17541" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3800" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17594" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36087" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36331" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-31535" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-23841" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-14615" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3445" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13435" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19603" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22925" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-20673" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-23840" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36330" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-33033" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18218" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20232" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20266" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-20838" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22876" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20231" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36332" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14155" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25010" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20838" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-17541" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10001" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25014" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36085" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14615" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-33560" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-17595" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3481" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-42574" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14155" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25009" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25010" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35523" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-28153" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-13750" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20197" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3426" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-18218" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3580" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3796" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17595" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26558" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25670" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25673" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3543" }, { "trust": 0.2, "url": "https://ubuntu.com/security/notices/usn-4997-1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2020-26139" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-04" }, { "trust": 0.1, "url": "https://alas.aws.amazon.com/al2/alaskernel-5.4-2022-004.html" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26144" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24504" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20239" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20194" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-0129" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-28950" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26143" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29368" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4140" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36386" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29660" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-28971" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36158" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26146" }, { "trust": 0.1, "url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-009" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-43527" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-44228" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3712" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:5137" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-34693" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26555" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12655" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20292" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-28972" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36322" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5995" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3564" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33098" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33033" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-28688" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20317" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-29650" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3483" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36385" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19449" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2854" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.11.0-1010.10" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.11.0-1011.11" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.11.0-1012.13" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.11.0-1011.12" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.11.0-1009.9" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.11.0-22.23" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.8/5.8.0-1033.34~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.8/5.8.0-1036.38~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.8.0-1029.32" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1035.37" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.8.0-59.66" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25671" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1038.40" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1036.38" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-59.66~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1030.32" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.8/5.8.0-1035.37~20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-5.8/5.8.0-1038.40~20.04.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-4999-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1033.34" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5000-2" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5000-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1041.42" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-4997-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-151.157" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1097.99" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1078.86" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1106.120" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5018-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1109.116" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1092.98" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1121.134" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33909" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1109.118" }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33194" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4627" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-26139" }, { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "PACKETSTORM", "id": "164875" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "166417" }, { "db": "PACKETSTORM", "id": "163249" }, { "db": "PACKETSTORM", "id": "163251" }, { "db": "PACKETSTORM", "id": "163291" }, { "db": "PACKETSTORM", "id": "163301" }, { "db": "PACKETSTORM", "id": "163599" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "CNNVD", "id": "CNNVD-202105-649" }, { "db": "NVD", "id": "CVE-2020-26139" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-26139" }, { "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "db": "PACKETSTORM", "id": "164875" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "166417" }, { "db": "PACKETSTORM", "id": "163249" }, { "db": "PACKETSTORM", "id": "163251" }, { "db": "PACKETSTORM", "id": "163291" }, { "db": "PACKETSTORM", "id": "163301" }, { "db": "PACKETSTORM", "id": "163599" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "CNNVD", "id": "CNNVD-202105-649" }, { "db": "NVD", "id": "CVE-2020-26139" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-05-11T00:00:00", "db": "VULMON", "id": "CVE-2020-26139" }, { "date": "2022-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "date": "2021-11-10T17:10:23", "db": "PACKETSTORM", "id": "164875" }, { "date": "2021-12-15T15:27:05", "db": "PACKETSTORM", "id": "165296" }, { "date": "2022-03-23T16:02:30", "db": "PACKETSTORM", "id": "166417" }, { "date": "2021-06-23T15:33:13", "db": "PACKETSTORM", "id": "163249" }, { "date": "2021-06-23T15:35:21", "db": "PACKETSTORM", "id": "163251" }, { "date": "2021-06-27T12:22:22", "db": "PACKETSTORM", "id": "163291" }, { "date": "2021-06-28T16:22:26", "db": "PACKETSTORM", "id": "163301" }, { "date": "2021-07-21T16:04:42", "db": "PACKETSTORM", "id": "163599" }, { "date": "2021-11-15T17:25:56", "db": "PACKETSTORM", "id": "164967" }, { "date": "2021-05-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202105-649" }, { "date": "2021-05-11T20:15:08.647000", "db": "NVD", "id": "CVE-2020-26139" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULMON", "id": "CVE-2020-26139" }, { "date": "2024-02-27T02:31:00", "db": "JVNDB", "id": "JVNDB-2021-006884" }, { "date": "2022-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202105-649" }, { "date": "2022-09-30T03:03:20.207000", "db": "NVD", "id": "CVE-2020-26139" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "166417" }, { "db": "PACKETSTORM", "id": "163249" }, { "db": "PACKETSTORM", "id": "163251" }, { "db": "PACKETSTORM", "id": "163291" }, { "db": "PACKETSTORM", "id": "163301" }, { "db": "PACKETSTORM", "id": "163599" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NetBSD\u00a0 of \u00a0 Authentication vulnerability in kernel", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-006884" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202105-649" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.