ID

VAR-202207-1358


CVE

CVE-2021-33656


TITLE

Linux kernel Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202207-1508

DESCRIPTION

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds. ========================================================================== Ubuntu Security Notice USN-5589-1 August 30, 2022 linux, linux-raspi vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-raspi: Linux kernel for Raspberry Pi systems Details: Asaf Modelevsky discovered that the Intel(R) 10GbE PCI Express (ixgbe) Ethernet driver for the Linux kernel performed insufficient control flow management. A local attacker could possibly use this to cause a denial of service. (CVE-2021-33061) It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33656) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: linux-image-5.4.0-1069-raspi 5.4.0-1069.79 linux-image-5.4.0-125-generic 5.4.0-125.141 linux-image-5.4.0-125-generic-lpae 5.4.0-125.141 linux-image-5.4.0-125-lowlatency 5.4.0-125.141 linux-image-generic 5.4.0.125.126 linux-image-generic-lpae 5.4.0.125.126 linux-image-lowlatency 5.4.0.125.126 linux-image-oem 5.4.0.125.126 linux-image-oem-osp1 5.4.0.125.126 linux-image-raspi 5.4.0.1069.102 linux-image-raspi2 5.4.0.1069.102 linux-image-virtual 5.4.0.125.126 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: kernel-rt security and bug fix update Advisory ID: RHSA-2023:2736-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:2736 Issue date: 2023-05-16 CVE Names: CVE-2021-26341 CVE-2021-33655 CVE-2021-33656 CVE-2022-1462 CVE-2022-1679 CVE-2022-1789 CVE-2022-2196 CVE-2022-2663 CVE-2022-3028 CVE-2022-3239 CVE-2022-3522 CVE-2022-3524 CVE-2022-3564 CVE-2022-3566 CVE-2022-3567 CVE-2022-3619 CVE-2022-3623 CVE-2022-3625 CVE-2022-3628 CVE-2022-3707 CVE-2022-4129 CVE-2022-20141 CVE-2022-25265 CVE-2022-30594 CVE-2022-39188 CVE-2022-39189 CVE-2022-41218 CVE-2022-41674 CVE-2022-42703 CVE-2022-42720 CVE-2022-42721 CVE-2022-42722 CVE-2022-43750 CVE-2022-47929 CVE-2023-0394 CVE-2023-0461 CVE-2023-1195 CVE-2023-1582 CVE-2023-23454 ==================================================================== 1. Summary: An update for kernel-rt is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux NFV (v. 8) - x86_64 Red Hat Enterprise Linux RT (v. 8) - x86_64 3. Description: The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es): * use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) * net/ulp: use-after-free in listening ULP sockets (CVE-2023-0461) * hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch (CVE-2021-26341) * malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory (CVE-2021-33655) * when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656) * possible race condition in drivers/tty/tty_buffers.c (CVE-2022-1462) * use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges (CVE-2022-1679) * KVM: NULL pointer dereference in kvm_mmu_invpcid_gva (CVE-2022-1789) * KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks (CVE-2022-2196) * netfilter: nf_conntrack_irc message handling issue (CVE-2022-2663) * race condition in xfrm_probe_algs can lead to OOB read/write (CVE-2022-3028) * media: em28xx: initialize refcount before kref_get (CVE-2022-3239) * race condition in hugetlb_no_page() in mm/hugetlb.c (CVE-2022-3522) * memory leak in ipv6_renew_options() (CVE-2022-3524) * data races around icsk->icsk_af_ops in do_ipv6_setsockopt (CVE-2022-3566) * data races around sk->sk_prot (CVE-2022-3567) * memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c (CVE-2022-3619) * denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry (CVE-2022-3623) * use-after-free after failed devlink reload in devlink_param_get (CVE-2022-3625) * USB-accessible buffer overflow in brcmfmac (CVE-2022-3628) * Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed (CVE-2022-3707) * l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference (CVE-2022-4129) * igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets (CVE-2022-20141) * Executable Space Protection Bypass (CVE-2022-25265) * Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option (CVE-2022-30594) * unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry (CVE-2022-39188) * TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning (CVE-2022-39189) * Report vmalloc UAF in dvb-core/dmxdev (CVE-2022-41218) * u8 overflow problem in cfg80211_update_notlisted_nontrans() (CVE-2022-41674) * use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) * use-after-free in bss_ref_get in net/wireless/scan.c (CVE-2022-42720) * BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c (CVE-2022-42721) * Denial of service in beacon protection for P2P-device (CVE-2022-42722) * memory corruption in usbmon driver (CVE-2022-43750) * NULL pointer dereference in traffic control subsystem (CVE-2022-47929) * NULL pointer dereference in rawv6_push_pending_frames (CVE-2023-0394) * use-after-free caused by invalid pointer hostname in fs/cifs/connect.c (CVE-2023-1195) * Soft lockup occurred during __page_mapcount (CVE-2023-1582) * slab-out-of-bounds read vulnerabilities in cbq_classify (CVE-2023-23454) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2055499 - CVE-2022-25265 kernel: Executable Space Protection Bypass 2061703 - CVE-2021-26341 hw: cpu: AMD CPUs may transiently execute beyond unconditional direct branch 2078466 - CVE-2022-1462 kernel: possible race condition in drivers/tty/tty_buffers.c 2084125 - CVE-2022-1679 kernel: use-after-free in ath9k_htc_probe_device() could cause an escalation of privileges 2085300 - CVE-2022-30594 kernel: Unprivileged users may use PTRACE_SEIZE to set PTRACE_O_SUSPEND_SECCOMP option 2090723 - CVE-2022-1789 kernel: KVM: NULL pointer dereference in kvm_mmu_invpcid_gva 2108691 - CVE-2021-33655 kernel: malicious data for FBIOPUT_VSCREENINFO ioctl may cause OOB write memory 2108696 - CVE-2021-33656 kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds 2114937 - CVE-2022-20141 kernel: igmp: use-after-free in ip_check_mc_rcu when opening and closing inet sockets 2122228 - CVE-2022-3028 kernel: race condition in xfrm_probe_algs can lead to OOB read/write 2122960 - CVE-2022-41218 kernel: Report vmalloc UAF in dvb-core/dmxdev 2123056 - CVE-2022-2663 kernel: netfilter: nf_conntrack_irc message handling issue 2124788 - CVE-2022-39189 kernel: TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED leading to guest malfunctioning 2127985 - CVE-2022-3239 kernel: media: em28xx: initialize refcount before kref_get 2130141 - CVE-2022-39188 kernel: unmap_mapping_range() race with munmap() on VM_PFNMAP mappings leads to stale TLB entry 2133483 - CVE-2022-42703 kernel: use-after-free related to leaf anon_vma double reuse 2134377 - CVE-2022-41674 kernel: u8 overflow problem in cfg80211_update_notlisted_nontrans() 2134451 - CVE-2022-42720 kernel: use-after-free in bss_ref_get in net/wireless/scan.c 2134506 - CVE-2022-42721 kernel: BSS list corruption in cfg80211_add_nontrans_list in net/wireless/scan.c 2134517 - CVE-2022-42722 kernel: Denial of service in beacon protection for P2P-device 2134528 - CVE-2022-4129 kernel: l2tp: missing lock when clearing sk_user_data can lead to NULL pointer dereference 2137979 - CVE-2022-3707 kernel: Double-free in split_2MB_gtt_entry when function intel_gvt_dma_map_guest_page failed 2143893 - CVE-2022-3566 kernel: data races around icsk->icsk_af_ops in do_ipv6_setsockopt 2143943 - CVE-2022-3567 kernel: data races around sk->sk_prot 2144720 - CVE-2022-3625 kernel: use-after-free after failed devlink reload in devlink_param_get 2150947 - CVE-2022-3524 kernel: memory leak in ipv6_renew_options() 2150960 - CVE-2022-3628 kernel: USB-accessible buffer overflow in brcmfmac 2150979 - CVE-2022-3522 kernel: race condition in hugetlb_no_page() in mm/hugetlb.c 2150999 - CVE-2022-3564 kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c 2151270 - CVE-2022-43750 kernel: memory corruption in usbmon driver 2154171 - CVE-2023-1195 kernel: use-after-free caused by invalid pointer hostname in fs/cifs/connect.c 2154235 - CVE-2022-3619 kernel: memory leak in l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c 2160023 - CVE-2022-2196 kernel: KVM: nVMX: missing IBPB when exiting from nested guest can lead to Spectre v2 attacks 2162120 - CVE-2023-0394 kernel: NULL pointer dereference in rawv6_push_pending_frames 2165721 - CVE-2022-3623 kernel: denial of service in follow_page_pte in mm/gup.c due to poisoned pte entry 2168246 - CVE-2022-47929 kernel: NULL pointer dereference in traffic control subsystem 2168297 - CVE-2023-23454 kernel: slab-out-of-bounds read vulnerabilities in cbq_classify 2176192 - CVE-2023-0461 kernel: net/ulp: use-after-free in listening ULP sockets 2180936 - CVE-2023-1582 kernel: Soft lockup occurred during __page_mapcount 6. Package List: Red Hat Enterprise Linux NFV (v. 8): Source: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.src.rpm x86_64: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-kvm-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-kvm-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm Red Hat Enterprise Linux RT (v. 8): Source: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.src.rpm x86_64: kernel-rt-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-core-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debug-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-debuginfo-common-x86_64-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-devel-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm kernel-rt-modules-extra-4.18.0-477.10.1.rt7.274.el8_8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-26341 https://access.redhat.com/security/cve/CVE-2021-33655 https://access.redhat.com/security/cve/CVE-2021-33656 https://access.redhat.com/security/cve/CVE-2022-1462 https://access.redhat.com/security/cve/CVE-2022-1679 https://access.redhat.com/security/cve/CVE-2022-1789 https://access.redhat.com/security/cve/CVE-2022-2196 https://access.redhat.com/security/cve/CVE-2022-2663 https://access.redhat.com/security/cve/CVE-2022-3028 https://access.redhat.com/security/cve/CVE-2022-3239 https://access.redhat.com/security/cve/CVE-2022-3522 https://access.redhat.com/security/cve/CVE-2022-3524 https://access.redhat.com/security/cve/CVE-2022-3564 https://access.redhat.com/security/cve/CVE-2022-3566 https://access.redhat.com/security/cve/CVE-2022-3567 https://access.redhat.com/security/cve/CVE-2022-3619 https://access.redhat.com/security/cve/CVE-2022-3623 https://access.redhat.com/security/cve/CVE-2022-3625 https://access.redhat.com/security/cve/CVE-2022-3628 https://access.redhat.com/security/cve/CVE-2022-3707 https://access.redhat.com/security/cve/CVE-2022-4129 https://access.redhat.com/security/cve/CVE-2022-20141 https://access.redhat.com/security/cve/CVE-2022-25265 https://access.redhat.com/security/cve/CVE-2022-30594 https://access.redhat.com/security/cve/CVE-2022-39188 https://access.redhat.com/security/cve/CVE-2022-39189 https://access.redhat.com/security/cve/CVE-2022-41218 https://access.redhat.com/security/cve/CVE-2022-41674 https://access.redhat.com/security/cve/CVE-2022-42703 https://access.redhat.com/security/cve/CVE-2022-42720 https://access.redhat.com/security/cve/CVE-2022-42721 https://access.redhat.com/security/cve/CVE-2022-42722 https://access.redhat.com/security/cve/CVE-2022-43750 https://access.redhat.com/security/cve/CVE-2022-47929 https://access.redhat.com/security/cve/CVE-2023-0394 https://access.redhat.com/security/cve/CVE-2023-0461 https://access.redhat.com/security/cve/CVE-2023-1195 https://access.redhat.com/security/cve/CVE-2023-1582 https://access.redhat.com/security/cve/CVE-2023-23454 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZGNu2tzjgjWX9erEAQh93A/9F2L57OgQtbqD3gy1RyYVyiSnovPSukbF MXVqHkJHDfKqynLRrFqm8FztET3BNsDC+tTmyMSDHxiZo4IF2x0ldkbi1sJ9YTx/ RdnlHnIFcmv7ubu628ATv/LvhOwCzVVw52pAJHJFQPiPEa29hGDC8aBk/YQBigXH PqYyMMfeEocvsFkMjf22FZ4t2CN6ktUQh38goKgYbN/wqYhjwHsXtlYTw51SW5+v TXaLFtH7VrARlC2YtzTrQZ+mvnLdutapSZJudb9lPPDTEeQGXxaqnzjgjPEUYl3y wM480wj5NxB+taVlnZGJh1Uwy75sISoWL/b7wyQH8OHqOyZ3pY8dcYE2scbkDlPx 1hA8PqpwHSyp7nFpPBSfYXtgrAMeLSsYRVyptTLwgRr28L29mFnfjd4PE0oL+hZV igKd6NbyVWbJ0Z7JnI305ghqp/SMr6t5nX5TRWpgOysPbWQH+mwnlf+xa72hyaCb cgmeDa1s28jCZeIREQoW8uVk4HGKhyqr/EQ66VCXaXJhF8m7qXoVPMCpE7gr0GPA WQ5N5haLNJQiPKFfaucuVGIS9syifMHs9nTeFLfCBXjKca4xBi/pWysj+XntceLH y+SBHI/AQPzBbN+uMCezkfvndP+Rbo/dTgAUwlVe61wwNmZUBBSP1FwyJUoeH2AH pumjkxlxpLs=ytDn -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description: Logging Subsystem 5.7.2 - Red Hat OpenShift Security Fix(es): * net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723) * rubygem-rack: denial of service in header parsing (CVE-2023-27539) * rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice (CVE-2023-28120) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/): 2178358 - CVE-2022-41723 net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding 2179637 - CVE-2023-28120 rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice 2179649 - CVE-2023-27539 rubygem-rack: denial of service in header parsing 5. JIRA issues fixed (https://issues.redhat.com/): LOG-3314 - [fluentd] The passphrase can not be enabled when forwarding logs to Kafka LOG-3316 - openshift-logging namespace can not be deleted directly when use lokistack as default store. LOG-3330 - run.sh shows incorrect chunk_limit_size if changed. LOG-3445 - [vector to loki] validation is not disabled when tls.insecureSkipVerify=true LOG-3749 - Unability to configure nodePlacement and toleration for logging-view-plugin LOG-3784 - [fluentd http] the defaut value HTTP content type application/x-ndjson is unsupported on datadog LOG-3827 - [fluentd http] The passphase isn't generated in fluent.conf LOG-3878 - [vector] PHP multiline errors are collected line by line when detectMultilineErrors is enabled. LOG-3945 - [Vector] Collector pods in CrashLoopBackOff when ClusterLogForwarder pipeline has space in between the pipeline name. LOG-3997 - Add http to log_forwarder_output_info metrics LOG-4011 - [Vector] Collector not complying with the custom tlsSecurityProfile configuration. LOG-4019 - [release-5.7] fluentd multiline exception plugin fails to detect JS client exception LOG-4049 - [release-5.7] User can list labels and label values for all user workload namespaces via Loki Label APIs LOG-4052 - [release-5.7] Fix Loki timeouts querying logs from OCP Console LOG-4098 - [release-5.7] No log_forwarder_output_info for splunk and google logging LOG-4151 - Fluentd fix missing nil check for rotated_tw in update_watcher LOG-4163 - [release-5.7] TLS configuration for multiple Kafka brokers is not created in Vector LOG-4185 - Resources, tolerations and nodeSelector for the collector are missing LOG-4218 - Vector fails to run when configuring syslog forwarding for audit log LOG-4219 - Vector handles journal log as container log when enabling syslog forwarding. It breaks the compatibility with Fluentd LOG-4220 - [RHOCP4.11] Logs of POD which doesn't have labels specified by structuredTypeKey are parsed to JSON, and forwarded to app-xxxxxx LOG-4221 - [release-5.7] Fluentd wrongly closes a log file due to hash collision 6

Trust: 1.8

sources: NVD: CVE-2021-33656 // VULHUB: VHN-393734 // PACKETSTORM: 168221 // PACKETSTORM: 168263 // PACKETSTORM: 168203 // PACKETSTORM: 168237 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 172336 // PACKETSTORM: 172895

AFFECTED PRODUCTS

vendor:openatommodel:openeulerscope:eqversion:20.03

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.127

Trust: 1.0

sources: NVD: CVE-2021-33656

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33656
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202207-1508
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-33656
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202207-1508 // NVD: CVE-2021-33656

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-393734 // NVD: CVE-2021-33656

THREAT TYPE

local

Trust: 1.3

sources: PACKETSTORM: 168221 // PACKETSTORM: 168263 // PACKETSTORM: 168203 // PACKETSTORM: 168237 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // CNNVD: CNNVD-202207-1508

TYPE

arbitrary

Trust: 0.7

sources: PACKETSTORM: 168221 // PACKETSTORM: 168263 // PACKETSTORM: 168203 // PACKETSTORM: 168237 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253

PATCH

title:Linux kernel Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=207700

Trust: 0.6

sources: CNNVD: CNNVD-202207-1508

EXTERNAL IDS

db:NVDid:CVE-2021-33656

Trust: 2.6

db:OPENWALLid:OSS-SECURITY/2022/07/19/3

Trust: 1.7

db:PACKETSTORMid:168253

Trust: 0.8

db:PACKETSTORMid:168203

Trust: 0.8

db:PACKETSTORMid:168221

Trust: 0.8

db:PACKETSTORMid:168238

Trust: 0.8

db:PACKETSTORMid:168264

Trust: 0.7

db:PACKETSTORMid:168177

Trust: 0.7

db:PACKETSTORMid:168335

Trust: 0.7

db:PACKETSTORMid:168589

Trust: 0.7

db:AUSCERTid:ESB-2022.4257

Trust: 0.6

db:AUSCERTid:ESB-2022.4278

Trust: 0.6

db:AUSCERTid:ESB-2022.4342

Trust: 0.6

db:AUSCERTid:ESB-2022.4317

Trust: 0.6

db:AUSCERTid:ESB-2022.4225

Trust: 0.6

db:AUSCERTid:ESB-2023.3339

Trust: 0.6

db:AUSCERTid:ESB-2022.4087

Trust: 0.6

db:AUSCERTid:ESB-2022.4184

Trust: 0.6

db:AUSCERTid:ESB-2022.4063

Trust: 0.6

db:AUSCERTid:ESB-2023.3060

Trust: 0.6

db:AUSCERTid:ESB-2022.4118

Trust: 0.6

db:CNNVDid:CNNVD-202207-1508

Trust: 0.6

db:PACKETSTORMid:168263

Trust: 0.2

db:PACKETSTORMid:168324

Trust: 0.2

db:PACKETSTORMid:168237

Trust: 0.2

db:PACKETSTORMid:168251

Trust: 0.1

db:PACKETSTORMid:168236

Trust: 0.1

db:PACKETSTORMid:168261

Trust: 0.1

db:VULHUBid:VHN-393734

Trust: 0.1

db:PACKETSTORMid:172336

Trust: 0.1

db:PACKETSTORMid:172895

Trust: 0.1

sources: VULHUB: VHN-393734 // PACKETSTORM: 168221 // PACKETSTORM: 168263 // PACKETSTORM: 168203 // PACKETSTORM: 168237 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 172336 // PACKETSTORM: 172895 // CNNVD: CNNVD-202207-1508 // NVD: CVE-2021-33656

REFERENCES

url:https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html

Trust: 1.7

url:http://www.openwall.com/lists/oss-security/2022/07/19/3

Trust: 1.7

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&packagename=kernel

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33656

Trust: 0.9

url:https://www.auscert.org.au/bulletins/esb-2022.4317

Trust: 0.6

url:https://packetstormsecurity.com/files/168335/ubuntu-security-notice-usn-5605-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3060

Trust: 0.6

url:https://packetstormsecurity.com/files/168177/ubuntu-security-notice-usn-5580-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168238/ubuntu-security-notice-usn-5592-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168203/ubuntu-security-notice-usn-5589-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168589/ubuntu-security-notice-usn-5650-1.html

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-33656/

Trust: 0.6

url:https://vigilance.fr/vulnerability/linux-kernel-buffer-overflow-via-pio-font-38848

Trust: 0.6

url:https://packetstormsecurity.com/files/168253/ubuntu-security-notice-usn-5595-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4063

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4184

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.3339

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4087

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4342

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4257

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4278

Trust: 0.6

url:https://packetstormsecurity.com/files/168221/ubuntu-security-notice-usn-5591-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4225

Trust: 0.6

url:https://packetstormsecurity.com/files/168264/ubuntu-security-notice-usn-5597-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4118

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33061

Trust: 0.5

url:https://ubuntu.com/security/notices/usn-5591-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-3239

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25265

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-47929

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42703

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-3028

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-4129

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3567

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-43750

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2196

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3566

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42720

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-20141

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3564

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3239

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3628

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1789

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25265

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2196

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41218

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-26341

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1679

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1789

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39188

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0461

Trust: 0.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42721

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1195

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-1582

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-30594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-2663

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3623

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3619

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3028

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3707

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-20141

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-42722

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3522

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-33655

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3524

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1462

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1679

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-26341

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-39189

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-41674

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-0394

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-30594

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-3625

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1462

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-2663

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33655

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33656

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2023-23454

Trust: 0.2

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&amp;packagename=kernel

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5600-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-125.141~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1069.79

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-125.141

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5589-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1136.146

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-192.203

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1150.165

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1052.57

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1126.131

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1135.151

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5591-3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1087.95~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-bluefield/5.4.0-1045.50

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1082.90

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1090.95

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1084.91

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm/5.4.0-1032.36

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1052.55

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-ibm-5.4/5.4.0-1032.36~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1074.79

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1087.95

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5592-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke/5.4.0-1081.87

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1082.90~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1069.79~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5603-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1084.91~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5595-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1090.95~18.04.1

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:2736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3522

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27535

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3627

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-28120

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3495

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3970

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27539

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29007

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41723

Trust: 0.1

url:https://issues.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25815

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-36227

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22490

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2491

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25652

Trust: 0.1

sources: VULHUB: VHN-393734 // PACKETSTORM: 168221 // PACKETSTORM: 168263 // PACKETSTORM: 168203 // PACKETSTORM: 168237 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253 // PACKETSTORM: 172336 // PACKETSTORM: 172895 // CNNVD: CNNVD-202207-1508 // NVD: CVE-2021-33656

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 168221 // PACKETSTORM: 168263 // PACKETSTORM: 168203 // PACKETSTORM: 168237 // PACKETSTORM: 168238 // PACKETSTORM: 168324 // PACKETSTORM: 168253

SOURCES

db:VULHUBid:VHN-393734
db:PACKETSTORMid:168221
db:PACKETSTORMid:168263
db:PACKETSTORMid:168203
db:PACKETSTORMid:168237
db:PACKETSTORMid:168238
db:PACKETSTORMid:168324
db:PACKETSTORMid:168253
db:PACKETSTORMid:172336
db:PACKETSTORMid:172895
db:CNNVDid:CNNVD-202207-1508
db:NVDid:CVE-2021-33656

LAST UPDATE DATE

2025-06-26T20:22:50.554000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-393734date:2022-10-29T00:00:00
db:CNNVDid:CNNVD-202207-1508date:2023-06-14T00:00:00
db:NVDid:CVE-2021-33656date:2025-04-02T18:33:53.340

SOURCES RELEASE DATE

db:VULHUBid:VHN-393734date:2022-07-18T00:00:00
db:PACKETSTORMid:168221date:2022-09-01T16:32:59
db:PACKETSTORMid:168263date:2022-09-06T16:25:57
db:PACKETSTORMid:168203date:2022-08-31T16:43:40
db:PACKETSTORMid:168237date:2022-09-02T15:21:10
db:PACKETSTORMid:168238date:2022-09-02T15:21:29
db:PACKETSTORMid:168324date:2022-09-09T15:56:54
db:PACKETSTORMid:168253date:2022-09-05T15:09:08
db:PACKETSTORMid:172336date:2023-05-16T17:04:05
db:PACKETSTORMid:172895date:2023-06-13T21:26:17
db:CNNVDid:CNNVD-202207-1508date:2022-07-18T00:00:00
db:NVDid:CVE-2021-33656date:2022-07-18T15:15:08.043