ID

VAR-202107-1361


CVE

CVE-2021-33909


TITLE

Linux Kernel  Classic buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-012742

DESCRIPTION

fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05. Linux Kernel Exists in a classic buffer overflow vulnerability. Vendor exploits this vulnerability CID-8cae8cd89f05 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. CVE-2020-36311 A flaw was discovered in the KVM subsystem for AMD CPUs, allowing an attacker to cause a denial of service by triggering destruction of a large SEV VM. CVE-2021-3609 Norbert Slusarek reported a race condition vulnerability in the CAN BCM networking protocol, allowing a local attacker to escalate privileges. An unprivileged local attacker able to create, mount, and then delete a deep directory structure whose total path length exceeds 1GB, can take advantage of this flaw for privilege escalation. Details can be found in the Qualys advisory at https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt CVE-2021-34693 Norbert Slusarek discovered an information leak in the CAN BCM networking protocol. A local attacker can take advantage of this flaw to obtain sensitive information from kernel stack memory. For the stable distribution (buster), these problems have been fixed in version 4.19.194-3. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmD2xvFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Tp/g//af2JkknfeqLs9FHFlqiYvIl1co4zEOW6e4BO8WAtvB3q5+scTNiFgN/W 66o9sDTi+Bnuhxja/lsZEkwM5QnrcPCSndUuY8EIOBDRdAla9R3xf4vUSYQ4KVb8 re3NmfzlkiLiGd6JRZXeV8+8stUjbLc6e0EG36S2HJ6hDs7pOA+vxcR/ui8yf15e p9egIKOqznhsNFHgrZRm4R1yqgNzfkFBWeSgfuFZGsFi9b2I3FJQKDTx0TXwxerB PKtvstJ1/xKbtK8m5IdntLOPeUPXuUlhoff4cN192IRNrPCcUXf7vRJoGg6A7WP2 dfvErldL8AsJHMBEs6YqEQSajFMoJX2590Bt8VK1xZwvhirSB7ZClk4+boh8OhlG apKj/OPIi3KGPt2s8t23zq3cU6aAFyTp6VQacuS+kR/2bdF0H3iQKcB5I4HFSSx9 BxK0ZpcZSw4axt35lfVhqnoeARb2GtUBqO77CWOOdtXcxDACD3VQ8PiqxxfpGS26 V/ASWmWzCeoGs+FQ5iRoN2JC5i9VcJX32r0fbNVvj7BG+ZQBe5XZ30eOalQLPs4/ SQnBoWuMnIpl/5+6FxkPXiqzkDGnkUm2ep2gXhdFrJmn/3ugpMiAPEuETo7Q2Lfj Ze6DKkHJPBK2BaKs1UgWPNvQBVQrcs0rKMLEf6LxS0eAJHlcCdo= =dhUe -----END PGP SIGNATURE----- . Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Ansible is a SSH-based configuration management, deployment, and task execution system. The openshift-ansible packages contain Ansible code and playbooks for installing and upgrading OpenShift Container Platform 3. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit. Bug Fix(es): * kernel-rt: update RT source tree to the RHEL-8.3.z source tree (BZ#1957359) * Placeholder bug for OCP 4.7.0 rpm release (BZ#1983534) 4. 8) - x86_64 3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:2730-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2730 Issue date: 2021-07-20 CVE Names: CVE-2021-3347 CVE-2021-33034 CVE-2021-33909 ==================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 7.6 Advanced Update Support, Red Hat Enterprise Linux 7.6 Telco Extended Update Support, and Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.6) - noarch, x86_64 Red Hat Enterprise Linux Server E4S (v. 7.6) - noarch, ppc64le, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server Optional E4S (v. 7.6) - ppc64le, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 7.6) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.6) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) * kernel: Use after free via PI futex state (CVE-2021-3347) * kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap [7.9.z] (BZ#1975159) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1922249 - CVE-2021-3347 kernel: Use after free via PI futex state 1961305 - CVE-2021-33034 kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan 1970273 - CVE-2021-33909 kernel: size_t-to-int conversion vulnerability in the filesystem layer 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.6): Source: kernel-3.10.0-957.78.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.78.2.el7.noarch.rpm kernel-doc-3.10.0-957.78.2.el7.noarch.rpm x86_64: bpftool-3.10.0-957.78.2.el7.x86_64.rpm kernel-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.78.2.el7.x86_64.rpm kernel-devel-3.10.0-957.78.2.el7.x86_64.rpm kernel-headers-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.78.2.el7.x86_64.rpm perf-3.10.0-957.78.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm python-perf-3.10.0-957.78.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.6): Source: kernel-3.10.0-957.78.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.78.2.el7.noarch.rpm kernel-doc-3.10.0-957.78.2.el7.noarch.rpm ppc64le: kernel-3.10.0-957.78.2.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-957.78.2.el7.ppc64le.rpm kernel-debug-3.10.0-957.78.2.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.78.2.el7.ppc64le.rpm kernel-devel-3.10.0-957.78.2.el7.ppc64le.rpm kernel-headers-3.10.0-957.78.2.el7.ppc64le.rpm kernel-tools-3.10.0-957.78.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm kernel-tools-libs-3.10.0-957.78.2.el7.ppc64le.rpm perf-3.10.0-957.78.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm python-perf-3.10.0-957.78.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm x86_64: kernel-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.78.2.el7.x86_64.rpm kernel-devel-3.10.0-957.78.2.el7.x86_64.rpm kernel-headers-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.78.2.el7.x86_64.rpm perf-3.10.0-957.78.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm python-perf-3.10.0-957.78.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.6): Source: kernel-3.10.0-957.78.2.el7.src.rpm noarch: kernel-abi-whitelists-3.10.0-957.78.2.el7.noarch.rpm kernel-doc-3.10.0-957.78.2.el7.noarch.rpm x86_64: bpftool-3.10.0-957.78.2.el7.x86_64.rpm kernel-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.78.2.el7.x86_64.rpm kernel-devel-3.10.0-957.78.2.el7.x86_64.rpm kernel-headers-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-957.78.2.el7.x86_64.rpm perf-3.10.0-957.78.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm python-perf-3.10.0-957.78.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 7.6): x86_64: kernel-debug-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.78.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional E4S (v. 7.6): ppc64le: kernel-debug-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm kernel-debug-devel-3.10.0-957.78.2.el7.ppc64le.rpm kernel-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-957.78.2.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-957.78.2.el7.ppc64le.rpm perf-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.ppc64le.rpm x86_64: kernel-debug-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.78.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 7.6): x86_64: kernel-debug-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-957.78.2.el7.x86_64.rpm perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-957.78.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-3347 https://access.redhat.com/security/cve/CVE-2021-33034 https://access.redhat.com/security/cve/CVE-2021-33909 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/RHSB-2021-006 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYPc/p9zjgjWX9erEAQiGYQ/6Apfv6Vn+s1cJsOrv5bpIB+TZWR8Dw4w6 7q5tqmrA0W38qvq7EWqVwAZMtmF2YXIcuP8i8zELAPG/Y1oMax3Piy5nxc4OR55i 8H9pc0lGZn9UJtryWMPaJRqvWGF1WhE/vGPUkHhI3CmoSVDN3B3OqfC04oeVa/Gt f9wikugrLvXoD+YsJk1LAn0tJ+xGrcbMRvwxvvtvwRsje2cGPU6OAEWQr1ZKyNZc Fwi6jLUve8d3wxE6+C6IocTYMcZcw2e2U4KOwE/ONXjjNgbwV+deQU16HJk4BjcA rDqtVUWzNGXzONh6Ua4yEisVe8LdhPNoZaciNx56lKpOs8Vbv58w29edfR1zf0fW c1gH+0S19jDSwsESNSKJth5A/GY0zxsUeh5qDjoFUF1AH6IuZNmPb3VGcl5klKuo outLUo2jeIRiBiZaNSVe32nbWCEkAoFF5WrvfHYmi+i9U45gLvUG2N58ZtOQiQkb potW9xF7f15Mm1Xm9TOIaNy+ykh7TJRxKnQSaAk/jnzTLp3XeVNmPTztx7zA4Z50 bgM/MQWB9j7NMjwEopdbS4lxJsvaXerwXPT+1WDAzBZ5clOKyB5hTxTTBOrsErzs O+wKRVu9eU4FMR6ULeL+pLCZPm0eVlu9jBuySEUI05/FkAVu/YUDrgXvMiy6XknI ziN+XVubHjk=1ifB -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================= Ubuntu Security Notice USN-5014-1 July 20, 2021 linux, linux-aws, linux-azure, linux-gcp, linux-gke-5.3, linux-hwe, linux-lts-xenial, linux-kvm, linux-oracle, linux-raspi, linux-raspi2-5.3 vulnerability ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 21.04 - Ubuntu 18.04 LTS - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: The system could be made to run programs as an administrator. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 21.04: linux-image-5.11.0-1012-azure 5.11.0-1012.13 linux-image-5.11.0-1012-kvm 5.11.0-1012.13 linux-image-5.11.0-1013-oracle 5.11.0-1013.14 linux-image-5.11.0-1014-aws 5.11.0-1014.15 linux-image-5.11.0-1014-gcp 5.11.0-1014.16 linux-image-5.11.0-1015-raspi 5.11.0-1015.16 linux-image-5.11.0-1015-raspi-nolpae 5.11.0-1015.16 linux-image-5.11.0-25-generic 5.11.0-25.27 linux-image-5.11.0-25-generic-64k 5.11.0-25.27 linux-image-5.11.0-25-generic-lpae 5.11.0-25.27 linux-image-5.11.0-25-lowlatency 5.11.0-25.27 linux-image-aws 5.11.0.1014.15 linux-image-azure 5.11.0.1012.13 linux-image-gcp 5.11.0.1014.14 linux-image-generic 5.11.0.25.27 linux-image-generic-64k 5.11.0.25.27 linux-image-generic-lpae 5.11.0.25.27 linux-image-gke 5.11.0.1014.14 linux-image-kvm 5.11.0.1012.13 linux-image-lowlatency 5.11.0.25.27 linux-image-oem-20.04 5.11.0.25.27 linux-image-oracle 5.11.0.1013.14 linux-image-raspi 5.11.0.1015.13 linux-image-raspi-nolpae 5.11.0.1015.13 linux-image-virtual 5.11.0.25.27 Ubuntu 18.04 LTS: linux-image-5.3.0-1042-raspi2 5.3.0-1042.44 linux-image-5.3.0-1045-gke 5.3.0-1045.48 linux-image-5.3.0-76-generic 5.3.0-76.72 linux-image-5.3.0-76-lowlatency 5.3.0-76.72 linux-image-gke-5.3 5.3.0.1045.28 linux-image-gkeop-5.3 5.3.0.76.133 linux-image-raspi2-hwe-18.04 5.3.0.1042.31 Ubuntu 16.04 ESM: linux-image-4.4.0-1095-kvm 4.4.0-1095.104 linux-image-4.4.0-1130-aws 4.4.0-1130.144 linux-image-4.4.0-212-generic 4.4.0-212.244 linux-image-4.4.0-212-lowlatency 4.4.0-212.244 linux-image-aws 4.4.0.1130.135 linux-image-generic 4.4.0.212.219 linux-image-kvm 4.4.0.1095.93 linux-image-lowlatency 4.4.0.212.219 linux-image-virtual 4.4.0.212.219 Ubuntu 14.04 ESM: linux-image-3.13.0-186-generic 3.13.0-186.237 linux-image-3.13.0-186-generic-lpae 3.13.0-186.237 linux-image-3.13.0-186-lowlatency 3.13.0-186.237 linux-image-3.13.0-186-powerpc-e500 3.13.0-186.237 linux-image-3.13.0-186-powerpc-e500mc 3.13.0-186.237 linux-image-3.13.0-186-powerpc-smp 3.13.0-186.237 linux-image-3.13.0-186-powerpc64-emb 3.13.0-186.237 linux-image-3.13.0-186-powerpc64-smp 3.13.0-186.237 linux-image-4.4.0-1094-aws 4.4.0-1094.99 linux-image-4.4.0-212-generic 4.4.0-212.244~14.04.1 linux-image-4.4.0-212-lowlatency 4.4.0-212.244~14.04.1 linux-image-aws 4.4.0.1094.92 linux-image-generic 3.13.0.186.195 linux-image-generic-lpae 3.13.0.186.195 linux-image-generic-lts-xenial 4.4.0.212.185 linux-image-generic-pae 3.13.0.186.195 linux-image-highbank 3.13.0.186.195 linux-image-lowlatency 3.13.0.186.195 linux-image-lowlatency-lts-xenial 4.4.0.212.185 linux-image-lowlatency-pae 3.13.0.186.195 linux-image-omap 3.13.0.186.195 linux-image-powerpc-e500 3.13.0.186.195 linux-image-powerpc-e500mc 3.13.0.186.195 linux-image-powerpc-smp 3.13.0.186.195 linux-image-powerpc64-emb 3.13.0.186.195 linux-image-powerpc64-smp 3.13.0.186.195 linux-image-server 3.13.0.186.195 linux-image-virtual 3.13.0.186.195 linux-image-virtual-lts-xenial 4.4.0.212.185 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. 8) - ppc64le, x86_64 3. Description: This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel

Trust: 2.34

sources: NVD: CVE-2021-33909 // JVNDB: JVNDB-2021-012742 // VULMON: CVE-2021-33909 // PACKETSTORM: 169086 // PACKETSTORM: 163682 // PACKETSTORM: 163579 // PACKETSTORM: 163583 // PACKETSTORM: 163595 // PACKETSTORM: 163603 // PACKETSTORM: 163607

AFFECTED PRODUCTS

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.5

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:9.0

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.5

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

vendor:netappmodel:solidfirescope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.16

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.10

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:8.4

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:3.12.43

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.9.276

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.240

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.4.134

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.11

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.13

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.12.19

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.13.4

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.4.276

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:netappmodel:hci management nodescope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:3.13

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.52

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:8.3

Trust: 1.0

vendor:oraclemodel:communications session border controllerscope:eqversion:8.2

Trust: 1.0

vendor:sonicwallmodel:sma1000scope:lteversion:12.4.2-02044

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.198

Trust: 1.0

vendor:日立model:rv3000scope: - version: -

Trust: 0.8

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.8

vendor:netappmodel:hci management nodescope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:netappmodel:solidfirescope: - version: -

Trust: 0.8

vendor:オラクルmodel:oracle communications session border controllerscope: - version: -

Trust: 0.8

vendor:日立model:ha8000v シリーズscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-012742 // NVD: CVE-2021-33909

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33909
value: HIGH

Trust: 1.0

NVD: CVE-2021-33909
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202107-1534
value: HIGH

Trust: 0.6

VULMON: CVE-2021-33909
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-33909
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2021-33909
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-33909
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2021-33909 // CNNVD: CNNVD-202107-1534 // JVNDB: JVNDB-2021-012742 // NVD: CVE-2021-33909

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-190

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-012742 // NVD: CVE-2021-33909

THREAT TYPE

local

Trust: 0.7

sources: PACKETSTORM: 163595 // CNNVD: CNNVD-202107-1534

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202107-1534

PATCH

title:Oracle Critical Patch Update Advisory - January 2022 Hitachi Server / Client Product Security Informationurl:https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html

Trust: 0.8

title:Linux kernel Enter the fix for the verification error vulnerabilityurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=157416

Trust: 0.6

title:Amazon Linux AMI: ALAS-2021-1524url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1524

Trust: 0.1

title:Debian Security Advisories: DSA-4941-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=fb9b5f5cc430f484f4420a11b7b87136

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-055url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-055

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.10-2022-003url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.10-2022-003

Trust: 0.1

title:Amazon Linux 2: ALAS2-2021-1691url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2021-1691

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-057url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-057

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-056url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-056

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-48] linux: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-48

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-50] linux-hardened: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-50

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-005url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-005

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-058url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-058

Trust: 0.1

title:Amazon Linux 2: ALAS2LIVEPATCH-2021-059url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2LIVEPATCH-2021-059

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-49] linux-zen: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-49

Trust: 0.1

title:Arch Linux Advisories: [ASA-202107-51] linux-lts: privilege escalationurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202107-51

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2021-33909 log

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=ec6577109e640dac19a6ddb978afe82d

Trust: 0.1

title:LinuxVulnerabilitiesurl:https://github.com/gitezri/LinuxVulnerabilities

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/AmIAHuman/CVE-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/Liang2580/CVE-2021-33909

Trust: 0.1

title:cve-2021-33909url:https://github.com/baerwolf/cve-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/bbinfosec43/CVE-2021-33909

Trust: 0.1

title:deep-directoryurl:https://github.com/sfowl/deep-directory

Trust: 0.1

title:integer_compilation_flagsurl:https://github.com/mdulin2/integer_compilation_flags

Trust: 0.1

title:CVE-2021-33909url:https://github.com/AlAIAL90/CVE-2021-33909

Trust: 0.1

title:CVE-2021-33909url:https://github.com/ChrisTheCoolHut/CVE-2021-33909

Trust: 0.1

title: - url:https://github.com/knewbury01/codeql-workshop-integer-conversion

Trust: 0.1

title:kickstart-rhel8url:https://github.com/alexhaydock/kickstart-rhel8

Trust: 0.1

title:exploit_articlesurl:https://github.com/ChoKyuWon/exploit_articles

Trust: 0.1

title: - url:https://github.com/hardenedvault/ved

Trust: 0.1

title:SVG-advisoriesurl:https://github.com/EGI-Federation/SVG-advisories

Trust: 0.1

title: - url:https://github.com/makoto56/penetration-suite-toolkit

Trust: 0.1

sources: VULMON: CVE-2021-33909 // CNNVD: CNNVD-202107-1534 // JVNDB: JVNDB-2021-012742

EXTERNAL IDS

db:NVDid:CVE-2021-33909

Trust: 4.0

db:PACKETSTORMid:163621

Trust: 2.4

db:OPENWALLid:OSS-SECURITY/2021/09/21/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/07/20/1

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/09/17/4

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/07/22/7

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/09/17/2

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2021/08/25/10

Trust: 1.6

db:PACKETSTORMid:165477

Trust: 1.6

db:PACKETSTORMid:163671

Trust: 1.6

db:PACKETSTORMid:164155

Trust: 1.6

db:ICS CERTid:ICSA-24-074-07

Trust: 0.8

db:JVNid:JVNVU93656033

Trust: 0.8

db:JVNDBid:JVNDB-2021-012742

Trust: 0.8

db:PACKETSTORMid:163682

Trust: 0.7

db:PACKETSTORMid:163568

Trust: 0.6

db:PACKETSTORMid:163634

Trust: 0.6

db:PACKETSTORMid:163577

Trust: 0.6

db:AUSCERTid:ESB-2022.0060

Trust: 0.6

db:AUSCERTid:ESB-2022.3346

Trust: 0.6

db:AUSCERTid:ESB-2021.3796

Trust: 0.6

db:AUSCERTid:ESB-2021.2589

Trust: 0.6

db:AUSCERTid:ESB-2021.3070

Trust: 0.6

db:AUSCERTid:ESB-2021.2547

Trust: 0.6

db:AUSCERTid:ESB-2021.2461

Trust: 0.6

db:AUSCERTid:ESB-2021.2453

Trust: 0.6

db:AUSCERTid:ESB-2021.2749

Trust: 0.6

db:AUSCERTid:ESB-2021.2543

Trust: 0.6

db:AUSCERTid:ESB-2021.2597

Trust: 0.6

db:AUSCERTid:ESB-2021.2583

Trust: 0.6

db:AUSCERTid:ESB-2021.2444

Trust: 0.6

db:AUSCERTid:ESB-2021.2657

Trust: 0.6

db:AUSCERTid:ESB-2021.2691

Trust: 0.6

db:AUSCERTid:ESB-2021.2532

Trust: 0.6

db:AUSCERTid:ESB-2021.4089

Trust: 0.6

db:CS-HELPid:SB2021072222

Trust: 0.6

db:CS-HELPid:SB2021122404

Trust: 0.6

db:CS-HELPid:SB2021072291

Trust: 0.6

db:CS-HELPid:SB2021080304

Trust: 0.6

db:CS-HELPid:SB2021072623

Trust: 0.6

db:CS-HELPid:SB2022012748

Trust: 0.6

db:CNNVDid:CNNVD-202107-1534

Trust: 0.6

db:VULMONid:CVE-2021-33909

Trust: 0.1

db:PACKETSTORMid:169086

Trust: 0.1

db:PACKETSTORMid:163579

Trust: 0.1

db:PACKETSTORMid:163583

Trust: 0.1

db:PACKETSTORMid:163595

Trust: 0.1

db:PACKETSTORMid:163603

Trust: 0.1

db:PACKETSTORMid:163607

Trust: 0.1

sources: VULMON: CVE-2021-33909 // PACKETSTORM: 169086 // PACKETSTORM: 163682 // PACKETSTORM: 163579 // PACKETSTORM: 163583 // PACKETSTORM: 163595 // PACKETSTORM: 163603 // PACKETSTORM: 163607 // CNNVD: CNNVD-202107-1534 // JVNDB: JVNDB-2021-012742 // NVD: CVE-2021-33909

REFERENCES

url:http://packetstormsecurity.com/files/163621/sequoia-a-deep-root-in-linuxs-filesystem-layer.html

Trust: 2.4

url:http://packetstormsecurity.com/files/165477/kernel-live-patch-security-notice-lsn-0083-1.html

Trust: 2.2

url:http://packetstormsecurity.com/files/163671/kernel-live-patch-security-notice-lsn-0079-1.html

Trust: 2.2

url:http://packetstormsecurity.com/files/164155/kernel-live-patch-security-notice-lsn-0081-1.html

Trust: 2.2

url:https://github.com/torvalds/linux/commit/8cae8cd89f05f6de223d63e6d15e31c8ba9cf53b

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/09/17/2

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/09/17/4

Trust: 1.6

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/08/25/10

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html

Trust: 1.6

url:https://www.openwall.com/lists/oss-security/2021/07/20/1

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/09/21/1

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2021/07/22/7

Trust: 1.6

url:https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html

Trust: 1.6

url:https://www.debian.org/security/2021/dsa-4941

Trust: 1.6

url:https://psirt.global.sonicwall.com/vuln-detail/snwlid-2022-0015

Trust: 1.6

url:https://security.netapp.com/advisory/ntap-20210819-0004/

Trust: 1.6

url:https://cdn.kernel.org/pub/linux/kernel/v5.x/changelog-5.13.4

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33909

Trust: 1.5

url:https://access.redhat.com/security/cve/cve-2021-33909

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/z4uhhigiso3fvrf4cqnjs4ika25atsfu/

Trust: 1.0

url:https://jvn.jp/vu/jvnvu93656033/index.html

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07

Trust: 0.8

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/z4uhhigiso3fvrf4cqnjs4ika25atsfu/

Trust: 0.6

url:https://packetstormsecurity.com/files/163634/red-hat-security-advisory-2021-2736-01.html

Trust: 0.6

url:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-integer-overflow-via-seq-set-overflow-35938

Trust: 0.6

url:https://packetstormsecurity.com/files/163577/red-hat-security-advisory-2021-2733-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021080304

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072623

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2657

Trust: 0.6

url:https://source.android.com/security/bulletin/2021-12-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0060

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072222

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6490825

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2583

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2461

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2444

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2543

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4089

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3796

Trust: 0.6

url:https://packetstormsecurity.com/files/163568/red-hat-security-advisory-2021-2734-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3070

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3346

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072291

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2547

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2589

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2749

Trust: 0.6

url:https://packetstormsecurity.com/files/163682/red-hat-security-advisory-2021-2763-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2691

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2532

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6525250

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2597

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022012748

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2453

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021122404

Trust: 0.6

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-006

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-32399

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-32399

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33034

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33034

Trust: 0.2

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-34693

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36311

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://www.qualys.com/2021/07/20/cve-2021-33909/sequoia-local-privilege-escalation-linux.txt

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3609

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33910

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2763

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2715

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2730

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3347

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3347

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5014-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.11.0-1014.16

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.11.0-1012.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.11.0-25.27

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.11.0-1015.16

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1012.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.3/5.3.0-1045.48

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2-5.3/5.3.0-1042.44

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.11.0-1013.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-76.72

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.11.0-1014.15

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2716

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2726

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20934

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11668

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20934

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-11668

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33033

Trust: 0.1

sources: PACKETSTORM: 169086 // PACKETSTORM: 163682 // PACKETSTORM: 163579 // PACKETSTORM: 163583 // PACKETSTORM: 163595 // PACKETSTORM: 163603 // PACKETSTORM: 163607 // CNNVD: CNNVD-202107-1534 // JVNDB: JVNDB-2021-012742 // NVD: CVE-2021-33909

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 163682 // PACKETSTORM: 163579 // PACKETSTORM: 163583 // PACKETSTORM: 163603 // PACKETSTORM: 163607

SOURCES

db:VULMONid:CVE-2021-33909
db:PACKETSTORMid:169086
db:PACKETSTORMid:163682
db:PACKETSTORMid:163579
db:PACKETSTORMid:163583
db:PACKETSTORMid:163595
db:PACKETSTORMid:163603
db:PACKETSTORMid:163607
db:CNNVDid:CNNVD-202107-1534
db:JVNDBid:JVNDB-2021-012742
db:NVDid:CVE-2021-33909

LAST UPDATE DATE

2025-09-19T22:00:25.568000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2021-33909date:2023-11-07T00:00:00
db:CNNVDid:CNNVD-202107-1534date:2022-12-12T00:00:00
db:JVNDBid:JVNDB-2021-012742date:2024-03-22T08:47:00
db:NVDid:CVE-2021-33909date:2023-11-07T03:35:56.050

SOURCES RELEASE DATE

db:VULMONid:CVE-2021-33909date:2021-07-20T00:00:00
db:PACKETSTORMid:169086date:2021-07-28T19:12:00
db:PACKETSTORMid:163682date:2021-07-27T14:47:55
db:PACKETSTORMid:163579date:2021-07-21T16:02:11
db:PACKETSTORMid:163583date:2021-07-21T16:02:44
db:PACKETSTORMid:163595date:2021-07-21T16:04:17
db:PACKETSTORMid:163603date:2021-07-21T16:05:14
db:PACKETSTORMid:163607date:2021-07-21T16:05:44
db:CNNVDid:CNNVD-202107-1534date:2021-07-20T00:00:00
db:JVNDBid:JVNDB-2021-012742date:2022-09-08T00:00:00
db:NVDid:CVE-2021-33909date:2021-07-20T19:15:09.747