ID

VAR-202201-0496


CVE

CVE-2021-4197


TITLE

Linux kernel Authorization problem vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202201-1396

DESCRIPTION

An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system. Bug Fix(es): * Failed to reboot after crash trigger (BZ#2060747) * conntrack entries linger around after test (BZ#2066357) * Enable nested virtualization (BZ#2079070) * slub corruption during LPM of hnv interface (BZ#2081251) * sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082091) * Backport request of "genirq: use rcu in kstat_irqs_usr()" (BZ#2083309) * ethtool -L may cause system to hang (BZ#2083323) * For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084139) * Affinity broken due to vector space exhaustion (BZ#2084647) * kernel memory leak while freeing nested actions (BZ#2086597) * sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088037) * Kernel panic possibly when cleaning namespace on pod deletion (BZ#2089539) * Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu’s. (BZ#2090485) * fix missed wake-ups in rq_qos_throttle try two (BZ#2092076) * NFS4 client experiencing IO outages while sending duplicate SYNs and erroneous RSTs during connection reestablishment (BZ#2094334) * using __this_cpu_read() in preemptible [00000000] code: kworker/u66:1/937154 (BZ#2095775) * Need some changes in RHEL8.x kernels. (BZ#2096932) 4. Bugs fixed (https://bugzilla.redhat.com/): 1903244 - CVE-2020-29368 kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check 2035652 - CVE-2021-4197 kernel: cgroup: Use open-time creds and namespace for migration perm checks 2036934 - CVE-2021-4203 kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses 2064604 - CVE-2022-1012 kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak 2086753 - CVE-2022-1729 kernel: race condition in perf_event_open leads to privilege escalation 2092427 - CVE-2022-32250 kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2022:1988-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:1988 Issue date: 2022-05-10 CVE Names: CVE-2020-0404 CVE-2020-4788 CVE-2020-13974 CVE-2020-27820 CVE-2021-0941 CVE-2021-3612 CVE-2021-3669 CVE-2021-3743 CVE-2021-3744 CVE-2021-3752 CVE-2021-3759 CVE-2021-3764 CVE-2021-3772 CVE-2021-3773 CVE-2021-4002 CVE-2021-4037 CVE-2021-4083 CVE-2021-4157 CVE-2021-4197 CVE-2021-4203 CVE-2021-20322 CVE-2021-21781 CVE-2021-26401 CVE-2021-29154 CVE-2021-37159 CVE-2021-41864 CVE-2021-42739 CVE-2021-43056 CVE-2021-43389 CVE-2021-43976 CVE-2021-44733 CVE-2021-45485 CVE-2021-45486 CVE-2022-0001 CVE-2022-0002 CVE-2022-0286 CVE-2022-0322 CVE-2022-1011 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 3. Security Fix(es): * kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) * kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404) * kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788) * kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974) * kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941) * kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612) * kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669) * kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743) * kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744) * kernel: possible use-after-free in bluetooth module (CVE-2021-3752) * kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759) * kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764) * kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772) * kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773) * kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002) * kernel: security regression for CVE-2018-13405 (CVE-2021-4037) * kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157) * kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197) * kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203) * kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322) * kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781) * hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) * kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) * kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159) * kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864) * kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) * kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056) * kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389) * kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976) * kernel: use-after-free in the TEE subsystem (CVE-2021-44733) * kernel: information leak in the IPv6 implementation (CVE-2021-45485) * kernel: information leak in the IPv4 implementation (CVE-2021-45486) * hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001) * hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002) * kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286) * kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322) * kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011) * kernel: use-after-free in nouveau kernel module (CVE-2020-27820) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1888433 - CVE-2020-4788 kernel: speculation on incompletely validated data on IBM Power9 1901726 - CVE-2020-27820 kernel: use-after-free in nouveau kernel module 1919791 - CVE-2020-0404 kernel: avoid cyclic entity chains due to malformed USB descriptors 1946684 - CVE-2021-29154 kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation 1951739 - CVE-2021-42739 kernel: Heap buffer overflow in firedtv driver 1957375 - [RFE] x86, tsc: Add kcmdline args for skipping tsc calibration sequences 1974079 - CVE-2021-3612 kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() 1981950 - CVE-2021-21781 kernel: arm: SIGPAGE information disclosure vulnerability 1983894 - Hostnetwork pod to service backed by hostnetwork on the same node is not working with OVN Kubernetes 1985353 - CVE-2021-37159 kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c 1986473 - CVE-2021-3669 kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts 1994390 - FIPS: deadlock between PID 1 and "modprobe crypto-jitterentropy_rng" at boot, preventing system to boot 1997338 - block: update to upstream v5.14 1997467 - CVE-2021-3764 kernel: DoS in ccp_run_aes_gcm_cmd() function 1997961 - CVE-2021-3743 kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c 1999544 - CVE-2021-3752 kernel: possible use-after-free in bluetooth module 1999675 - CVE-2021-3759 kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks 2000627 - CVE-2021-3744 kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() 2000694 - CVE-2021-3772 kernel: sctp: Invalid chunks may be used to remotely remove existing associations 2004949 - CVE-2021-3773 kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients 2009312 - Incorrect system time reported by the cpu guest statistics (PPC only). 2009521 - XFS: sync to upstream v5.11 2010463 - CVE-2021-41864 kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write 2011104 - statfs reports wrong free space for small quotas 2013180 - CVE-2021-43389 kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c 2014230 - CVE-2021-20322 kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies 2015525 - SCTP peel-off with SELinux and containers in OCP 2015755 - zram: zram leak with warning when running zram02.sh in ltp 2016169 - CVE-2020-13974 kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c 2017073 - CVE-2021-43056 kernel: ppc: kvm: allows a malicious KVM guest to crash the host 2017796 - ceph omnibus backport for RHEL-8.6.0 2018205 - CVE-2021-0941 kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free 2022814 - Rebase the input and HID stack in 8.6 to v5.15 2025003 - CVE-2021-43976 kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device 2025726 - CVE-2021-4002 kernel: possible leak or coruption of data residing on hugetlbfs 2027239 - CVE-2021-4037 kernel: security regression for CVE-2018-13405 2029923 - CVE-2021-4083 kernel: fget: check that the fd still exists after getting a ref to it 2030476 - Kernel 4.18.0-348.2.1 secpath_cache memory leak involving strongswan tunnel 2030747 - CVE-2021-44733 kernel: use-after-free in the TEE subsystem 2031200 - rename(2) fails on subfolder mounts when the share path has a trailing slash 2034342 - CVE-2021-4157 kernel: Buffer overwrite in decode_nfs_fh function 2035652 - CVE-2021-4197 kernel: cgroup: Use open-time creds and namespace for migration perm checks 2036934 - CVE-2021-4203 kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses 2037019 - CVE-2022-0286 kernel: Local denial of service in bond_ipsec_add_sa 2039911 - CVE-2021-45485 kernel: information leak in the IPv6 implementation 2039914 - CVE-2021-45486 kernel: information leak in the IPv4 implementation 2042798 - [RHEL8.6][sfc] General sfc driver update 2042822 - CVE-2022-0322 kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c 2043453 - [RHEL8.6 wireless] stack & drivers general update to v5.16+ 2046021 - kernel 4.18.0-358.el8 async dirops causes write errors with namespace restricted caps 2048251 - Selinux is not allowing SCTP connection setup between inter pod communication in enforcing mode 2061700 - CVE-2021-26401 hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 2061712 - CVE-2022-0001 hw: cpu: intel: Branch History Injection (BHI) 2061721 - CVE-2022-0002 hw: cpu: intel: Intra-Mode BTI 2064855 - CVE-2022-1011 kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes 6. Package List: Red Hat Enterprise Linux BaseOS (v. 8): Source: kernel-4.18.0-372.9.1.el8.src.rpm aarch64: bpftool-4.18.0-372.9.1.el8.aarch64.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-4.18.0-372.9.1.el8.aarch64.rpm kernel-core-4.18.0-372.9.1.el8.aarch64.rpm kernel-cross-headers-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-core-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-devel-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-modules-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.9.1.el8.aarch64.rpm kernel-devel-4.18.0-372.9.1.el8.aarch64.rpm kernel-headers-4.18.0-372.9.1.el8.aarch64.rpm kernel-modules-4.18.0-372.9.1.el8.aarch64.rpm kernel-modules-extra-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-libs-4.18.0-372.9.1.el8.aarch64.rpm perf-4.18.0-372.9.1.el8.aarch64.rpm perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm python3-perf-4.18.0-372.9.1.el8.aarch64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm noarch: kernel-abi-stablelists-4.18.0-372.9.1.el8.noarch.rpm kernel-doc-4.18.0-372.9.1.el8.noarch.rpm ppc64le: bpftool-4.18.0-372.9.1.el8.ppc64le.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-4.18.0-372.9.1.el8.ppc64le.rpm kernel-core-4.18.0-372.9.1.el8.ppc64le.rpm kernel-cross-headers-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-core-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-devel-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-modules-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.9.1.el8.ppc64le.rpm kernel-devel-4.18.0-372.9.1.el8.ppc64le.rpm kernel-headers-4.18.0-372.9.1.el8.ppc64le.rpm kernel-modules-4.18.0-372.9.1.el8.ppc64le.rpm kernel-modules-extra-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-libs-4.18.0-372.9.1.el8.ppc64le.rpm perf-4.18.0-372.9.1.el8.ppc64le.rpm perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm python3-perf-4.18.0-372.9.1.el8.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm s390x: bpftool-4.18.0-372.9.1.el8.s390x.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-4.18.0-372.9.1.el8.s390x.rpm kernel-core-4.18.0-372.9.1.el8.s390x.rpm kernel-cross-headers-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-core-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-devel-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-modules-4.18.0-372.9.1.el8.s390x.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.s390x.rpm kernel-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-372.9.1.el8.s390x.rpm kernel-devel-4.18.0-372.9.1.el8.s390x.rpm kernel-headers-4.18.0-372.9.1.el8.s390x.rpm kernel-modules-4.18.0-372.9.1.el8.s390x.rpm kernel-modules-extra-4.18.0-372.9.1.el8.s390x.rpm kernel-tools-4.18.0-372.9.1.el8.s390x.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-core-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-devel-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-modules-4.18.0-372.9.1.el8.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-372.9.1.el8.s390x.rpm perf-4.18.0-372.9.1.el8.s390x.rpm perf-debuginfo-4.18.0-372.9.1.el8.s390x.rpm python3-perf-4.18.0-372.9.1.el8.s390x.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.s390x.rpm x86_64: bpftool-4.18.0-372.9.1.el8.x86_64.rpm bpftool-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-4.18.0-372.9.1.el8.x86_64.rpm kernel-core-4.18.0-372.9.1.el8.x86_64.rpm kernel-cross-headers-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-core-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-devel-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-modules-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.9.1.el8.x86_64.rpm kernel-devel-4.18.0-372.9.1.el8.x86_64.rpm kernel-headers-4.18.0-372.9.1.el8.x86_64.rpm kernel-modules-4.18.0-372.9.1.el8.x86_64.rpm kernel-modules-extra-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-libs-4.18.0-372.9.1.el8.x86_64.rpm perf-4.18.0-372.9.1.el8.x86_64.rpm perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm python3-perf-4.18.0-372.9.1.el8.x86_64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm Red Hat CodeReady Linux Builder (v. 8): aarch64: bpftool-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm kernel-tools-libs-devel-4.18.0-372.9.1.el8.aarch64.rpm perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm kernel-tools-libs-devel-4.18.0-372.9.1.el8.ppc64le.rpm perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm kernel-tools-libs-devel-4.18.0-372.9.1.el8.x86_64.rpm perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm python3-perf-debuginfo-4.18.0-372.9.1.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYnqSF9zjgjWX9erEAQjBXQ/8DSpFUMNN6ZVFtli2KuVowVLS+14J0jtj 0zxpr0skJT8vVulU3VTeURBMdg9NAo9bj3R5KTk2+dC+AMuHET5aoVvaYmimBGKL 5qzpu7q9Z0aaD2I288suHCnYuRJnt+qKZtNa4hlcY92bN0tcYBonxsdIS2xM6xIu GHNS8HNVUNz4PuCBfmbITvgX9Qx+iZQVlVccDBG5LDpVwgOtnrxHKbe5E499v/9M oVoN+eV9ulHAZdCHWlUAahbsvEqDraCKNT0nHq/xO5dprPjAcjeKYMeaICtblRr8 k+IouGywaN+mW4sBjnaaiuw2eAtoXq/wHisX1iUdNkroqcx9NBshWMDBJnE4sxQJ ZOSc8B6yjJItPvUI7eD3BDgoka/mdoyXTrg+9VRrir6vfDHPrFySLDrO1O5HM5fO 3sExCVO2VM7QMCGHJ1zXXX4szk4SV/PRsjEesvHOyR2xTKZZWMsXe1h9gYslbADd tW0yco/G23xjxqOtMKuM/nShBChflMy9apssldiOfdqODJMv5d4rRpt0xgmtSOM6 qReveuQCasmNrGlAHgDwbtWz01fmSuk9eYDhZNmHA3gxhoHIV/y+wr0CLbOQtDxT p79nhiqwUo5VMj/X30Lu0Wl3ptLuhRWamzTCkEEzdubr8aVsT4RRNQU3KfVFfpT1 MWp/2ui3i80= =Fdgy -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bugs fixed (https://bugzilla.redhat.com/): 2009024 - Unable to complete cluster destruction, some ports are left over 2055494 - console operator should report Upgradeable False when SAN-less certs are used 2083554 - post 1.23 rebase: regression in service-load balancer reliability 2087021 - configure-ovs.sh fails, blocking new RHEL node from being scaled up on cluster without manual reboot 2088539 - Openshift route URLs starting with double slashes stopped working after update to 4.8.33 - curl version problems 2091806 - Cluster upgrade stuck due to "resource deletions in progress" 2095320 - [4.9] Bootimage bump tracker 2097157 - [4.9z] During ovnkube-node restart all host conntrack entries are flushed, leading to traffic disruption 2100786 - [OCP 4.9] Ironic cannot match "wwn" rootDeviceHint for a multipath device 2101664 - disabling ipv6 router advertisements using "all" does not disable it on secondary interfaces 2101959 - CVE-2022-2403 openshift: oauth-serving-cert configmap contains cluster certificate private key 2103982 - [4.9] AWS EBS CSI driver stuck removing EBS volumes - GetDeviceMountRefs check failed 2105277 - NetworkPolicies: ovnkube-master pods crashing due to panic: "invalid memory address or nil pointer dereference" 2105453 - Node reboot causes duplicate persistent volumes 2105654 - egressIP panics with nil pointer dereference 2105663 - APIRequestCount does not identify some APIs removed in 4.9 2106655 - Kubelet slowly leaking memory and pods eventually unable to start 2108538 - [4.9.z backport] br-ex not created due to default bond interface having a different mac address than expected 2108619 - ClusterVersion history pruner does not always retain initial completed update entry 5. ========================================================================== Ubuntu Security Notice USN-5467-1 June 08, 2022 linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-azure-fde, linux-gcp, linux-gke, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-azure-fde: Linux kernel for Microsoft Azure cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-gke: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop: Linux kernel for Google Container Engine (GKE) systems - linux-ibm: Linux kernel for IBM cloud systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems - linux-raspi: Linux kernel for Raspberry Pi systems - linux-aws-5.4: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-5.4: Linux kernel for Microsoft Azure cloud systems - linux-gke-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-gkeop-5.4: Linux kernel for Google Container Engine (GKE) systems - linux-hwe-5.4: Linux hardware enablement (HWE) kernel - linux-ibm-5.4: Linux kernel for IBM cloud systems - linux-oracle-5.4: Linux kernel for Oracle Cloud systems - linux-raspi-5.4: Linux kernel for Raspberry Pi systems Details: It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) It was discovered that the SCTP protocol implementation in the Linux kernel did not properly verify VTAGs in some situations. A remote attacker could possibly use this to cause a denial of service (connection disassociation). (CVE-2021-3772) Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. (CVE-2021-4197) Jann Horn discovered that the FUSE file system in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1011) Qiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM implementation in the Linux kernel did not properly perform guest page table updates in some situations. An attacker in a guest vm could possibly use this to crash the host OS. (CVE-2022-1158) Duoming Zhou discovered that the 6pack protocol implementation in the Linux kernel did not handle detach events properly in some situations, leading to a use-after-free vulnerability. (CVE-2022-1198) It was discovered that the PF_KEYv2 implementation in the Linux kernel did not properly initialize kernel memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1353) It was discovered that the implementation of X.25 network protocols in the Linux kernel did not terminate link layer sessions properly. (CVE-2022-1516) Demi Marie Obenour and Simon Gaiser discovered that several Xen para- virtualization device frontends did not properly restrict the access rights of device backends. An attacker could possibly use a malicious Xen backend to gain access to memory pages of a guest VM or cause a denial of service in the guest. (CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042) It was discovered that the USB Gadget file system interface in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-24958) It was discovered that the USB SR9700 ethernet device driver for the Linux kernel did not properly validate the length of requests from the device. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-26966) 赵子轩 discovered that the 802.2 LLC type 2 driver in the Linux kernel did not properly perform reference counting in some error conditions. (CVE-2022-28356) It was discovered that the Microchip CAN BUS Analyzer interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free. (CVE-2022-28389) It was discovered that the EMS CAN/USB interface implementation in the Linux kernel contained a double-free vulnerability when handling certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-28390) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1026-ibm 5.4.0-1026.29 linux-image-5.4.0-1046-gkeop 5.4.0-1046.48 linux-image-5.4.0-1065-raspi 5.4.0-1065.75 linux-image-5.4.0-1068-kvm 5.4.0-1068.72 linux-image-5.4.0-1074-gke 5.4.0-1074.79 linux-image-5.4.0-1076-oracle 5.4.0-1076.83 linux-image-5.4.0-1078-aws 5.4.0-1078.84 linux-image-5.4.0-1078-gcp 5.4.0-1078.84 linux-image-5.4.0-1083-azure 5.4.0-1083.87 linux-image-5.4.0-1083-azure-fde 5.4.0-1083.87+cvm1.1 linux-image-5.4.0-117-generic 5.4.0-117.132 linux-image-5.4.0-117-generic-lpae 5.4.0-117.132 linux-image-5.4.0-117-lowlatency 5.4.0-117.132 linux-image-aws-lts-20.04 5.4.0.1078.79 linux-image-azure-fde 5.4.0.1083.87+cvm1.24 linux-image-azure-lts-20.04 5.4.0.1083.81 linux-image-gcp-lts-20.04 5.4.0.1078.85 linux-image-generic 5.4.0.117.120 linux-image-generic-lpae 5.4.0.117.120 linux-image-gke 5.4.0.1074.83 linux-image-gke-5.4 5.4.0.1074.83 linux-image-gkeop 5.4.0.1046.48 linux-image-gkeop-5.4 5.4.0.1046.48 linux-image-ibm 5.4.0.1026.24 linux-image-ibm-lts-20.04 5.4.0.1026.24 linux-image-kvm 5.4.0.1068.66 linux-image-lowlatency 5.4.0.117.120 linux-image-oem 5.4.0.117.120 linux-image-oem-osp1 5.4.0.117.120 linux-image-oracle-lts-20.04 5.4.0.1076.75 linux-image-raspi 5.4.0.1065.98 linux-image-raspi2 5.4.0.1065.98 linux-image-virtual 5.4.0.117.120 Ubuntu 18.04 LTS: linux-image-5.4.0-1026-ibm 5.4.0-1026.29~18.04.1 linux-image-5.4.0-1046-gkeop 5.4.0-1046.48~18.04.1 linux-image-5.4.0-1065-raspi 5.4.0-1065.75~18.04.1 linux-image-5.4.0-1074-gke 5.4.0-1074.79~18.04.1 linux-image-5.4.0-1076-oracle 5.4.0-1076.83~18.04.1 linux-image-5.4.0-1078-aws 5.4.0-1078.84~18.04.1 linux-image-5.4.0-1083-azure 5.4.0-1083.87~18.04.1 linux-image-5.4.0-117-generic 5.4.0-117.132~18.04.1 linux-image-5.4.0-117-generic-lpae 5.4.0-117.132~18.04.1 linux-image-5.4.0-117-lowlatency 5.4.0-117.132~18.04.1 linux-image-aws 5.4.0.1078.59 linux-image-azure 5.4.0.1083.61 linux-image-generic-hwe-18.04 5.4.0.117.132~18.04.99 linux-image-generic-lpae-hwe-18.04 5.4.0.117.132~18.04.99 linux-image-gke-5.4 5.4.0.1074.79~18.04.37 linux-image-gkeop-5.4 5.4.0.1046.48~18.04.44 linux-image-ibm 5.4.0.1026.41 linux-image-lowlatency-hwe-18.04 5.4.0.117.132~18.04.99 linux-image-oem 5.4.0.117.132~18.04.99 linux-image-oem-osp1 5.4.0.117.132~18.04.99 linux-image-oracle 5.4.0.1076.83~18.04.54 linux-image-raspi-hwe-18.04 5.4.0.1065.65 linux-image-snapdragon-hwe-18.04 5.4.0.117.132~18.04.99 linux-image-virtual-hwe-18.04 5.4.0.117.132~18.04.99 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5467-1 CVE-2021-3772, CVE-2021-4197, CVE-2022-1011, CVE-2022-1158, CVE-2022-1198, CVE-2022-1353, CVE-2022-1516, CVE-2022-1966, CVE-2022-21499, CVE-2022-23036, CVE-2022-23037, CVE-2022-23038, CVE-2022-23039, CVE-2022-23040, CVE-2022-23041, CVE-2022-23042, CVE-2022-24958, CVE-2022-26966, CVE-2022-28356, CVE-2022-28389, CVE-2022-28390 Package Information: https://launchpad.net/ubuntu/+source/linux/5.4.0-117.132 https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1078.84 https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1083.87 https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1083.87+cvm1.1 https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1078.84 https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1074.79 https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1046.48 https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1026.29 https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1068.72 https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1076.83 https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1065.75 https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1078.84~18.04.1 https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1083.87~18.04.1 https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1074.79~18.04.1 https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1046.48~18.04.1 https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-117.132~18.04.1 https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1026.29~18.04.1 https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1076.83~18.04.1 https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1065.75~18.04.1 . Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.25. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2022:5729 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html Security Fix(es): * golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675) * golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921) * golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.25-x86_64 The image digest is sha256:ed84fb3fbe026b3bbb4a2637ddd874452ac49c6ead1e15675f257e28664879cc (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.25-s390x The image digest is sha256:a151628743b643e8ceda09dbd290aa4ac2787fc519365603a5612cb4d379d8e3 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.25-ppc64le The image digest is sha256:5ee9476628f198cdadd8f7afe6f117e8102eaafba8345e95d2f479c260eb0574 All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2053532 - CVE-2022-23772 golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString 2060058 - superfluous apirequestcount entries in audit log 2064857 - CVE-2022-24921 golang: regexp: stack exhaustion via a deeply nested expression 2077688 - CVE-2022-24675 golang: encoding/pem: fix stack overflow in Decode 2079034 - [4.10] Openshift Container Platform - Ingress Controller does not set allowPrivilegeEscalation in the router deployment 2094584 - VM with sysprep is failed to create 2095217 - VM SSH command generated by UI points at api VIP 2095319 - [4.10] Bootimage bump tracker 2098655 - gcp cluster rollback fails due to storage failure 2099526 - prometheus-adapter becomes inaccessible during rollout 2100894 - Possible to cause misconfiguration of container runtime soon after cluster creation 2100974 - Layout issue: No spacing in delete modals 2103175 - disabling ipv6 router advertisements using "all" does not disable it on secondary interfaces 2105110 - [VPA] recommender is logging errors for pods with init containers 2105275 - NodeIP is used instead of EgressIP 2105653 - egressIP panics with nil pointer dereference 2106385 - the cronjob object is created with a wrong api version batch/v1beta1 when created via the openshift console 2106842 - In CI 4.10 HAProxy must-gather takes longer than 10 minutes 2107276 - The ccoctl does not seem to know how to leverage the VMs service account to talk to GCP APIs. 2109125 - [4.10 Backport] Spoke BMH stuck "inspecting" when deployed via ZTP in 4.11 OCP hub 2109225 - Console 4.10 operand form refresh 2109235 - openshift-apiserver pods never going NotReady 5. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Bug Fix(es): * kernel-rt: update RT source tree to the RHEL-8.4.z10 source tree (BZ#2087922) 4

Trust: 1.71

sources: NVD: CVE-2021-4197 // VULHUB: VHN-410862 // PACKETSTORM: 167852 // PACKETSTORM: 167097 // PACKETSTORM: 168019 // PACKETSTORM: 167443 // PACKETSTORM: 167886 // PACKETSTORM: 167952 // PACKETSTORM: 167822 // PACKETSTORM: 167694

AFFECTED PRODUCTS

vendor:netappmodel:h700sscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.15

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.11

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.4.189

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.19.238

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.15.14

Trust: 1.0

vendor:oraclemodel:communications cloud native core binding support functionscope:eqversion:22.1.1

Trust: 1.0

vendor:oraclemodel:communications cloud native core binding support functionscope:eqversion:22.2.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:4.14.276

Trust: 1.0

vendor:netappmodel:h410cscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:5.5

Trust: 1.0

vendor:broadcommodel:brocade fabric operating systemscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications cloud native core binding support functionscope:eqversion:22.1.3

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.111

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:h300sscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.20

Trust: 1.0

vendor:netappmodel:h500sscope:eqversion: -

Trust: 1.0

vendor:netappmodel:h410sscope:eqversion: -

Trust: 1.0

vendor:linuxmodel:kernelscope:gteversion:4.2

Trust: 1.0

sources: NVD: CVE-2021-4197

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-4197
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202201-1396
value: HIGH

Trust: 0.6

VULHUB: VHN-410862
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-4197
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-410862
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-4197
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-410862 // CNNVD: CNNVD-202201-1396 // NVD: CVE-2021-4197

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.1

sources: VULHUB: VHN-410862 // NVD: CVE-2021-4197

THREAT TYPE

local

Trust: 0.9

sources: PACKETSTORM: 167443 // PACKETSTORM: 167886 // PACKETSTORM: 167694 // CNNVD: CNNVD-202201-1396

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202201-1396

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-410862

PATCH

title:Linux kernel Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=178248

Trust: 0.6

sources: CNNVD: CNNVD-202201-1396

EXTERNAL IDS

db:NVDid:CVE-2021-4197

Trust: 2.5

db:PACKETSTORMid:167694

Trust: 0.8

db:PACKETSTORMid:167443

Trust: 0.8

db:PACKETSTORMid:168019

Trust: 0.8

db:PACKETSTORMid:167097

Trust: 0.8

db:PACKETSTORMid:167952

Trust: 0.8

db:PACKETSTORMid:167886

Trust: 0.8

db:PACKETSTORMid:167852

Trust: 0.8

db:PACKETSTORMid:167746

Trust: 0.7

db:PACKETSTORMid:168136

Trust: 0.7

db:PACKETSTORMid:166392

Trust: 0.7

db:PACKETSTORMid:167714

Trust: 0.7

db:CNNVDid:CNNVD-202201-1396

Trust: 0.7

db:AUSCERTid:ESB-2022.3136

Trust: 0.6

db:AUSCERTid:ESB-2022.3918

Trust: 0.6

db:AUSCERTid:ESB-2022.3738

Trust: 0.6

db:AUSCERTid:ESB-2022.2841

Trust: 0.6

db:AUSCERTid:ESB-2022.0615

Trust: 0.6

db:AUSCERTid:ESB-2022.3435

Trust: 0.6

db:AUSCERTid:ESB-2022.2855

Trust: 0.6

db:AUSCERTid:ESB-2022.0629

Trust: 0.6

db:AUSCERTid:ESB-2022.0380

Trust: 0.6

db:AUSCERTid:ESB-2022.3236

Trust: 0.6

db:AUSCERTid:ESB-2022.0800

Trust: 0.6

db:AUSCERTid:ESB-2022.2014

Trust: 0.6

db:AUSCERTid:ESB-2022.3312

Trust: 0.6

db:AUSCERTid:ESB-2022.1237

Trust: 0.6

db:AUSCERTid:ESB-2022.0612

Trust: 0.6

db:AUSCERTid:ESB-2022.4150

Trust: 0.6

db:AUSCERTid:ESB-2022.3243

Trust: 0.6

db:CS-HELPid:SB2022070643

Trust: 0.6

db:CS-HELPid:SB2022062931

Trust: 0.6

db:CS-HELPid:SB2022071352

Trust: 0.6

db:CS-HELPid:SB2022071354

Trust: 0.6

db:CS-HELPid:SB2022070743

Trust: 0.6

db:CS-HELPid:SB2022070221

Trust: 0.6

db:CS-HELPid:SB2022060828

Trust: 0.6

db:CS-HELPid:SB2022031105

Trust: 0.6

db:CS-HELPid:SB2022072071

Trust: 0.6

db:PACKETSTORMid:166636

Trust: 0.6

db:PACKETSTORMid:167822

Trust: 0.2

db:PACKETSTORMid:167748

Trust: 0.1

db:PACKETSTORMid:167072

Trust: 0.1

db:CNVDid:CNVD-2022-68560

Trust: 0.1

db:VULHUBid:VHN-410862

Trust: 0.1

sources: VULHUB: VHN-410862 // PACKETSTORM: 167852 // PACKETSTORM: 167097 // PACKETSTORM: 168019 // PACKETSTORM: 167443 // PACKETSTORM: 167886 // PACKETSTORM: 167952 // PACKETSTORM: 167822 // PACKETSTORM: 167694 // CNNVD: CNNVD-202201-1396 // NVD: CVE-2021-4197

REFERENCES

url:https://security.netapp.com/advisory/ntap-20220602-0006/

Trust: 1.7

url:https://www.debian.org/security/2022/dsa-5127

Trust: 1.7

url:https://www.debian.org/security/2022/dsa-5173

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=2035652

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujul2022.html

Trust: 1.7

url:https://lore.kernel.org/lkml/20211209214707.805617-1-tj%40kernel.org/t/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-4197

Trust: 0.8

url:https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/t/

Trust: 0.7

url:https://packetstormsecurity.com/files/168019/red-hat-security-advisory-2022-5879-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3738

Trust: 0.6

url:https://packetstormsecurity.com/files/167852/red-hat-security-advisory-2022-5626-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060828

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3918

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0380

Trust: 0.6

url:https://packetstormsecurity.com/files/167886/ubuntu-security-notice-usn-5541-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072071

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022062931

Trust: 0.6

url:https://packetstormsecurity.com/files/166392/ubuntu-security-notice-usn-5337-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4150

Trust: 0.6

url:https://packetstormsecurity.com/files/167443/ubuntu-security-notice-usn-5467-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167714/ubuntu-security-notice-usn-5505-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3243

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0615

Trust: 0.6

url:https://packetstormsecurity.com/files/167694/ubuntu-security-notice-usn-5500-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2014

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070643

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0612

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070743

Trust: 0.6

url:https://packetstormsecurity.com/files/166636/ubuntu-security-notice-usn-5368-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167097/red-hat-security-advisory-2022-1988-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070221

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071354

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2855

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071352

Trust: 0.6

url:https://packetstormsecurity.com/files/167952/red-hat-security-advisory-2022-5730-01.html

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-4197/

Trust: 0.6

url:https://packetstormsecurity.com/files/167746/ubuntu-security-notice-usn-5513-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168136/red-hat-security-advisory-2022-6053-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0629

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022031105

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-privilege-escalation-via-cgroup-fd-writing-37262

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0800

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3136

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3312

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3236

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2841

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3435

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1237

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-4203

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-4197

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2021-4203

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-1729

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-32250

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-1729

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-1012

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2020-29368

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-1012

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-32250

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-29368

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1353

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-3772

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-34169

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21540

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21540

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-34169

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-21541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1011

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1516

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1198

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-28389

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-28356

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2022:5626

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3752

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-21781

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4157

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3669

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-42739

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3744

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27820

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3759

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1988

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4083

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3773

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1011

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13974

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3759

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4083

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45486

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37159

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-4788

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4037

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-0404

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3669

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13974

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0322

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43056

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3612

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3764

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-45485

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3773

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-4788

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-41864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-21781

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43976

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37159

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4305

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-0941

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26401

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-0941

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3744

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27820

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4157

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3612

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-41864

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42739

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0286

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-26401

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0404

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/updating/updating-cluster-cli.html

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2403

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:5878

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2403

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24958

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1065.75

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1083.87

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1158

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1078.84

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-117.132

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-117.132~18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23040

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23039

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1074.79~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1065.75~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1026.29~18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1966

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1046.48~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1083.87~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1078.84

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1076.83

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1076.83~18.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21499

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1078.84~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1083.87+cvm1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1026.29

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1074.79

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1068.72

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26966

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5467-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1046.48

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2380

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-28388

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1204

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5541-1

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5730

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24921

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24921

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-23772

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24675

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24675

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23772

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5633

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1679

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1419

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5500-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1652

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4202

Trust: 0.1

sources: VULHUB: VHN-410862 // PACKETSTORM: 167852 // PACKETSTORM: 167097 // PACKETSTORM: 168019 // PACKETSTORM: 167443 // PACKETSTORM: 167886 // PACKETSTORM: 167952 // PACKETSTORM: 167822 // PACKETSTORM: 167694 // CNNVD: CNNVD-202201-1396 // NVD: CVE-2021-4197

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 167852 // PACKETSTORM: 167097 // PACKETSTORM: 168019 // PACKETSTORM: 167952 // PACKETSTORM: 167822

SOURCES

db:VULHUBid:VHN-410862
db:PACKETSTORMid:167852
db:PACKETSTORMid:167097
db:PACKETSTORMid:168019
db:PACKETSTORMid:167443
db:PACKETSTORMid:167886
db:PACKETSTORMid:167952
db:PACKETSTORMid:167822
db:PACKETSTORMid:167694
db:CNNVDid:CNNVD-202201-1396
db:NVDid:CVE-2021-4197

LAST UPDATE DATE

2025-04-28T21:38:22.843000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-410862date:2023-02-03T00:00:00
db:CNNVDid:CNNVD-202201-1396date:2022-08-24T00:00:00
db:NVDid:CVE-2021-4197date:2024-11-21T06:37:07.517

SOURCES RELEASE DATE

db:VULHUBid:VHN-410862date:2022-03-23T00:00:00
db:PACKETSTORMid:167852date:2022-07-27T17:32:01
db:PACKETSTORMid:167097date:2022-05-11T16:54:36
db:PACKETSTORMid:168019date:2022-08-10T15:50:18
db:PACKETSTORMid:167443date:2022-06-08T15:58:59
db:PACKETSTORMid:167886date:2022-07-29T14:39:49
db:PACKETSTORMid:167952date:2022-08-04T14:49:08
db:PACKETSTORMid:167822date:2022-07-27T17:20:56
db:PACKETSTORMid:167694date:2022-07-04T14:32:13
db:CNNVDid:CNNVD-202201-1396date:2022-01-17T00:00:00
db:NVDid:CVE-2021-4197date:2022-03-23T20:15:10.200