ID

VAR-202207-1358


CVE

CVE-2021-33656


TITLE

Ubuntu Security Notice USN-5591-1

Trust: 0.1

sources: PACKETSTORM: 168221

DESCRIPTION

When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds. ========================================================================== Ubuntu Security Notice USN-5650-1 September 30, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) It was discovered that the virtual terminal driver in the Linux kernel did not properly handle VGA console font changes, leading to an out-of-bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33656) Christian Brauner discovered that the XFS file system implementation in the Linux kernel did not properly handle setgid file creation. A local attacker could use this to gain elevated privileges. (CVE-2021-4037) It was discovered that the ext4 file system implementation in the Linux kernel did not properly initialize memory in some situations. A privileged local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0850) Duoming Zhou discovered that the AX.25 amateur radio protocol implementation in the Linux kernel did not handle detach events properly in some situations. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1199) Duoming Zhou discovered race conditions in the AX.25 amateur radio protocol implementation in the Linux kernel during device detach operations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-1204) Norbert Slusarek discovered that a race condition existed in the perf subsystem in the Linux kernel, resulting in a use-after-free vulnerability. A privileged local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1729) It was discovered that the Packet network protocol implementation in the Linux kernel contained an out-of-bounds access. A remote attacker could use this to expose sensitive information (kernel memory). (CVE-2022-20368) It was discovered that the Open vSwitch implementation in the Linux kernel contained an out of bounds write vulnerability in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2639) Jann Horn discovered that the ASIX AX88179/178A USB Ethernet driver in the Linux kernel contained multiple out-of-bounds vulnerabilities. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2964) Hao Sun and Jiacheng Xu discovered that the NILFS file system implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-2978) Abhishek Shah discovered a race condition in the PF_KEYv2 implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). (CVE-2022-3028) It was discovered that the Journaled File System (JFS) in the Linux kernel contained a null pointer dereference in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3202) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1114-kvm 4.4.0-1114.124 linux-image-4.4.0-1151-aws 4.4.0-1151.166 linux-image-4.4.0-234-generic 4.4.0-234.268 linux-image-4.4.0-234-lowlatency 4.4.0-234.268 linux-image-aws 4.4.0.1151.155 linux-image-generic 4.4.0.234.240 linux-image-kvm 4.4.0.1114.111 linux-image-lowlatency 4.4.0.234.240 linux-image-virtual 4.4.0.234.240 Ubuntu 14.04 ESM: linux-image-4.4.0-1113-aws 4.4.0-1113.119 linux-image-4.4.0-234-generic 4.4.0-234.268~14.04.1 linux-image-4.4.0-234-lowlatency 4.4.0-234.268~14.04.1 linux-image-aws 4.4.0.1113.110 linux-image-generic-lts-xenial 4.4.0.234.203 linux-image-lowlatency-lts-xenial 4.4.0.234.203 linux-image-virtual-lts-xenial 4.4.0.234.203 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5650-1 CVE-2021-33655, CVE-2021-33656, CVE-2021-4037, CVE-2022-0850, CVE-2022-1199, CVE-2022-1204, CVE-2022-1729, CVE-2022-20368, CVE-2022-2639, CVE-2022-2964, CVE-2022-2978, CVE-2022-3028, CVE-2022-3202, CVE-2022-36946 . Description: Red Hat Advanced Cluster Management for Kubernetes 2.5.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/ Security fix(es): * CVE-2023-32314 vm2: Sandbox Escape * CVE-2023-32313 vm2: Inspect Manipulation 3. Solution: For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions about installing this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing 4. Bugs fixed (https://bugzilla.redhat.com/): 2208376 - CVE-2023-32314 vm2: Sandbox Escape 2208377 - CVE-2023-32313 vm2: Inspect Manipulation 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security, bug fix, and enhancement update Advisory ID: RHSA-2023:4789-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:4789 Issue date: 2023-08-29 CVE Names: CVE-2021-33656 CVE-2022-42896 CVE-2023-1637 CVE-2023-1829 CVE-2023-2002 CVE-2023-2124 CVE-2023-3390 CVE-2023-20593 CVE-2023-28466 CVE-2023-35788 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder EUS (v.8.6) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux BaseOS EUS (v.8.6) - aarch64, noarch, ppc64le, s390x, x86_64 3. Security Fix(es): * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter (CVE-2023-1829) * kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests (CVE-2023-3390) * kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) * kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds (CVE-2021-33656) * kernel: save/restore speculative MSRs during S3 suspend/resume (CVE-2023-1637) * Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * kernel: OOB access in the Linux kernel's XFS subsystem (CVE-2023-2124) * hw: amd: Cross-Process Information Leak (CVE-2023-20593) * kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference (CVE-2023-28466) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Simultaneous writes to a page on xfs can result in zero-byte data (BZ#2184103) * Invalid character detected by rpminspect in Documentation/translations/zh_CN/process/magic-number.rst (BZ#2208286) * Low memory deadlock with md devices and external (imsm) metadata handling - - requires a kernfs notification backport (BZ#2208542) * Windows Server 2019 guest randomly pauses with "KVM: entry failed, hardware error 0x80000021" (BZ#2211663) * Marvell 8.7 Bug qedi shutdown handler hangs upon reboot (BZ#2215334) * aacraid misses interrupts when a CPU is disabled resulting in scsi timeouts and the adapter being unusable until reboot. (BZ#2216499) * rbd: avoid fast-diff corruption in snapshot-based mirroring [8.9] (BZ#2216770) * OCS 4.8 cephfs kernel crash : mds_dispatch ceph_handle_snap unable to handle kernel NULL (BZ#2218273) * FJ8.6 Bug: System panic occurs because the list used by i40e driver is corrupted (BZ#2219262) * st_gmac tx-checksum offload on vlan is not consistent with st_gmac interface (BZ#2219908) * Regression of 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()") (BZ#2220811) * refcount_t overflow often happens in mem_cgroup_id_get_online() (BZ#2221011) * Scheduler update (rhel8.8) (BZ#2221304) * RHEL8.6 boot panic with message "kernel BUG at lib/list_debug.c:28!" (BZ#2222247) * Enable conntrack clash resolution for GRE (BZ#2223543) * Intel 8.8 BUG SPR perf: Workaround the UPI intel_uncore_has_discovery_tables issue on SPR MCC and LCC (BZ#2225514) * KVM: x86: fix sending PV IPI (BZ#2226580) * libceph: harden msgr2.1 frame segment length checks [8.x] (BZ#2227074) Enhancement(s): * Mellanox 8.7 FEAT mlx5: It's possible to enable LRO when XDP is active (BZ#2165585) * Export symbol pci_find_host_bridge (BZ#2225335) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2108696 - CVE-2021-33656 kernel: when setting font with malicious data by ioctl PIO_FONT, kernel will write memory out of bounds 2147364 - CVE-2022-42896 kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c 2179000 - CVE-2023-28466 kernel: tls: race condition in do_tls_getsockopt may lead to use-after-free or NULL pointer dereference 2181891 - CVE-2023-1637 kernel: save/restore speculative MSRs during S3 suspend/resume 2187308 - CVE-2023-2002 Kernel: bluetooth: Unauthorized management command execution 2187439 - CVE-2023-2124 kernel: OOB access in the Linux kernel's XFS subsystem 2188470 - CVE-2023-1829 kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter 2213260 - CVE-2023-3390 kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests 2215768 - CVE-2023-35788 kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() 2217845 - CVE-2023-20593 hw: amd: Cross-Process Information Leak 6. Package List: Red Hat Enterprise Linux BaseOS EUS (v.8.6): Source: kernel-4.18.0-372.70.1.el8_6.src.rpm aarch64: bpftool-4.18.0-372.70.1.el8_6.aarch64.rpm bpftool-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-core-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-cross-headers-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debug-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debug-core-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debug-devel-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debug-modules-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debug-modules-extra-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-devel-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-headers-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-modules-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-modules-extra-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-tools-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-tools-libs-4.18.0-372.70.1.el8_6.aarch64.rpm perf-4.18.0-372.70.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm python3-perf-4.18.0-372.70.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm noarch: kernel-abi-stablelists-4.18.0-372.70.1.el8_6.noarch.rpm kernel-doc-4.18.0-372.70.1.el8_6.noarch.rpm ppc64le: bpftool-4.18.0-372.70.1.el8_6.ppc64le.rpm bpftool-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-core-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-cross-headers-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debug-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debug-core-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debug-devel-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debug-modules-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debug-modules-extra-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-devel-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-headers-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-modules-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-modules-extra-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-tools-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-tools-libs-4.18.0-372.70.1.el8_6.ppc64le.rpm perf-4.18.0-372.70.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm python3-perf-4.18.0-372.70.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm s390x: bpftool-4.18.0-372.70.1.el8_6.s390x.rpm bpftool-debuginfo-4.18.0-372.70.1.el8_6.s390x.rpm kernel-4.18.0-372.70.1.el8_6.s390x.rpm kernel-core-4.18.0-372.70.1.el8_6.s390x.rpm kernel-cross-headers-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debug-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debug-core-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debug-debuginfo-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debug-devel-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debug-modules-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debug-modules-extra-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debuginfo-4.18.0-372.70.1.el8_6.s390x.rpm kernel-debuginfo-common-s390x-4.18.0-372.70.1.el8_6.s390x.rpm kernel-devel-4.18.0-372.70.1.el8_6.s390x.rpm kernel-headers-4.18.0-372.70.1.el8_6.s390x.rpm kernel-modules-4.18.0-372.70.1.el8_6.s390x.rpm kernel-modules-extra-4.18.0-372.70.1.el8_6.s390x.rpm kernel-tools-4.18.0-372.70.1.el8_6.s390x.rpm kernel-tools-debuginfo-4.18.0-372.70.1.el8_6.s390x.rpm kernel-zfcpdump-4.18.0-372.70.1.el8_6.s390x.rpm kernel-zfcpdump-core-4.18.0-372.70.1.el8_6.s390x.rpm kernel-zfcpdump-debuginfo-4.18.0-372.70.1.el8_6.s390x.rpm kernel-zfcpdump-devel-4.18.0-372.70.1.el8_6.s390x.rpm kernel-zfcpdump-modules-4.18.0-372.70.1.el8_6.s390x.rpm kernel-zfcpdump-modules-extra-4.18.0-372.70.1.el8_6.s390x.rpm perf-4.18.0-372.70.1.el8_6.s390x.rpm perf-debuginfo-4.18.0-372.70.1.el8_6.s390x.rpm python3-perf-4.18.0-372.70.1.el8_6.s390x.rpm python3-perf-debuginfo-4.18.0-372.70.1.el8_6.s390x.rpm x86_64: bpftool-4.18.0-372.70.1.el8_6.x86_64.rpm bpftool-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-core-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-cross-headers-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debug-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debug-core-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debug-devel-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debug-modules-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debug-modules-extra-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-devel-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-headers-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-modules-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-modules-extra-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-tools-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-tools-libs-4.18.0-372.70.1.el8_6.x86_64.rpm perf-4.18.0-372.70.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm python3-perf-4.18.0-372.70.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm Red Hat CodeReady Linux Builder EUS (v.8.6): aarch64: bpftool-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debug-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-debuginfo-common-aarch64-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-tools-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm kernel-tools-libs-devel-4.18.0-372.70.1.el8_6.aarch64.rpm perf-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm python3-perf-debuginfo-4.18.0-372.70.1.el8_6.aarch64.rpm ppc64le: bpftool-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debug-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-debuginfo-common-ppc64le-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-tools-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm kernel-tools-libs-devel-4.18.0-372.70.1.el8_6.ppc64le.rpm perf-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm python3-perf-debuginfo-4.18.0-372.70.1.el8_6.ppc64le.rpm x86_64: bpftool-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debug-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-debuginfo-common-x86_64-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-tools-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm kernel-tools-libs-devel-4.18.0-372.70.1.el8_6.x86_64.rpm perf-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm python3-perf-debuginfo-4.18.0-372.70.1.el8_6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk7gVaAAoJENzjgjWX9erEbPcP/A7VJs/bk9ehr9RmtFheMoZw aTjj77INTVUXeEw303RN0MY4WeA9iNLfoawU9pQwKSOTPFN2LH/dX5M5G4z8fcF4 AqJ52MLnaRvfqvGR/VBL5ndG6Txal4qBaEthXiZPjXVLPdLBLUpKxFvc037T3vLa N1TlS84iuCj+lRKKK3mWzwpuxF+7rG5TyjfmKxBpdVpiy+3CesWdg8z/cp3yHnZR D+/bKMlWaFrot6epZTolqXR3q8gtzdfdvBT+uNCqWFLC4fbRcECz659shdKCe94s au3GaLQoSsv/1o2/Fr9p0X2355CUwo/blWmQRdxHhCrNVAW43zct7UdIefjQFdlN JMEKMLPlsPIqwFM5O24oXNwu2WDFBqhRqVOpU29wCb2A+nZX9KW7G5+wraGQsUle YKt8MyQTrmruN21UqRGTMBUzFmVcVbMoVuKhw8Ruzu+LT7Q8emlVlUIxdeZevVyI qAsK4u/21qEur8snQUZOs1K5JZ/eGvPPOFIlDKamAZUA2KMBRHVf4UpXWRl+yUNZ BwVlqJ883g5fzkyn610ip8wezvIt6JHbQTwfn3GL+GlZm8C6P7TnInRyRAPrEVyb x6ZgJXJcUSvxQ5vfDRxDzQBaki0LlsxEu0z4MNWTlQkijDMqEt+YvOoWnAPOfb6S E/3xFaymeUv8HNa2jzZE =8lpC -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.98

sources: NVD: CVE-2021-33656 // VULHUB: VHN-393734 // PACKETSTORM: 168221 // PACKETSTORM: 168264 // PACKETSTORM: 168263 // PACKETSTORM: 168237 // PACKETSTORM: 168261 // PACKETSTORM: 168177 // PACKETSTORM: 168324 // PACKETSTORM: 168589 // PACKETSTORM: 168335 // PACKETSTORM: 172703 // PACKETSTORM: 174369

AFFECTED PRODUCTS

vendor:openatommodel:openeulerscope:eqversion:20.03

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:linuxmodel:kernelscope:ltversion:5.10.127

Trust: 1.0

sources: NVD: CVE-2021-33656

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-33656
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2021-33656
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2021-33656

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-393734 // NVD: CVE-2021-33656

THREAT TYPE

local

Trust: 0.9

sources: PACKETSTORM: 168221 // PACKETSTORM: 168264 // PACKETSTORM: 168263 // PACKETSTORM: 168237 // PACKETSTORM: 168261 // PACKETSTORM: 168177 // PACKETSTORM: 168324 // PACKETSTORM: 168589 // PACKETSTORM: 168335

TYPE

arbitrary

Trust: 0.9

sources: PACKETSTORM: 168221 // PACKETSTORM: 168264 // PACKETSTORM: 168263 // PACKETSTORM: 168237 // PACKETSTORM: 168261 // PACKETSTORM: 168177 // PACKETSTORM: 168324 // PACKETSTORM: 168589 // PACKETSTORM: 168335

EXTERNAL IDS

db:NVDid:CVE-2021-33656

Trust: 2.2

db:OPENWALLid:OSS-SECURITY/2022/07/19/3

Trust: 1.1

db:PACKETSTORMid:168263

Trust: 0.2

db:PACKETSTORMid:168264

Trust: 0.2

db:PACKETSTORMid:168177

Trust: 0.2

db:PACKETSTORMid:168324

Trust: 0.2

db:PACKETSTORMid:168221

Trust: 0.2

db:PACKETSTORMid:168237

Trust: 0.2

db:PACKETSTORMid:168335

Trust: 0.2

db:PACKETSTORMid:168589

Trust: 0.2

db:PACKETSTORMid:168261

Trust: 0.2

db:PACKETSTORMid:168251

Trust: 0.1

db:PACKETSTORMid:168253

Trust: 0.1

db:PACKETSTORMid:168203

Trust: 0.1

db:PACKETSTORMid:168236

Trust: 0.1

db:PACKETSTORMid:168238

Trust: 0.1

db:VULHUBid:VHN-393734

Trust: 0.1

db:PACKETSTORMid:172703

Trust: 0.1

db:PACKETSTORMid:174369

Trust: 0.1

sources: VULHUB: VHN-393734 // PACKETSTORM: 168221 // PACKETSTORM: 168264 // PACKETSTORM: 168263 // PACKETSTORM: 168237 // PACKETSTORM: 168261 // PACKETSTORM: 168177 // PACKETSTORM: 168324 // PACKETSTORM: 168589 // PACKETSTORM: 168335 // PACKETSTORM: 172703 // PACKETSTORM: 174369 // NVD: CVE-2021-33656

REFERENCES

url:https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2022/07/19/3

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33656

Trust: 1.1

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&packagename=kernel

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-33061

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2021-33655

Trust: 0.3

url:https://ubuntu.com/security/notices/usn-5591-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-20368

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-36946

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-3028

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-33656

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://www.openeuler.org/en/security/cve/detail.html?id=cve-2021-33656&amp;packagename=kernel

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5597-1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5600-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-125.141~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1136.146

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-192.203

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1150.165

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-dell300x/4.15.0-1052.57

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1126.131

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1135.151

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5591-3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1105.116

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5598-1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5580-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1069.79~18.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5603-1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5650-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1729

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2639

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1199

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2964

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1204

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2978

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3202

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5605-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-fde/5.4.0-1090.95+cvm1.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3522

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3625

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1462

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-20141

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3619

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42721

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-3204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2795

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3707

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42720

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-27535

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3204

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-32313

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3628

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-32314

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-2663

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-47929

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-30594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2196

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-25265

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3239

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41973

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42722

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1462

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-2663

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-22490

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-20141

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23454

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39188

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3564

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-4129

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0461

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3566

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33655

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3028

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1679

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3627

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1679

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1582

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-29007

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3970

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1789

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-39189

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26341

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-26341

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25265

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:3356

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1195

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3524

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-43750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-3623

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-36227

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-0394

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-23946

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-41674

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-25652

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42703

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1829

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-35788

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:4789

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1637

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1637

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-42896

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2002

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-2124

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-28466

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-35788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28466

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-3390

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-20593

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2023-1829

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-20593

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-3390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-2124

Trust: 0.1

sources: VULHUB: VHN-393734 // PACKETSTORM: 168221 // PACKETSTORM: 168264 // PACKETSTORM: 168263 // PACKETSTORM: 168237 // PACKETSTORM: 168261 // PACKETSTORM: 168177 // PACKETSTORM: 168324 // PACKETSTORM: 168589 // PACKETSTORM: 168335 // PACKETSTORM: 172703 // PACKETSTORM: 174369 // NVD: CVE-2021-33656

CREDITS

Ubuntu

Trust: 0.9

sources: PACKETSTORM: 168221 // PACKETSTORM: 168264 // PACKETSTORM: 168263 // PACKETSTORM: 168237 // PACKETSTORM: 168261 // PACKETSTORM: 168177 // PACKETSTORM: 168324 // PACKETSTORM: 168589 // PACKETSTORM: 168335

SOURCES

db:VULHUBid:VHN-393734
db:PACKETSTORMid:168221
db:PACKETSTORMid:168264
db:PACKETSTORMid:168263
db:PACKETSTORMid:168237
db:PACKETSTORMid:168261
db:PACKETSTORMid:168177
db:PACKETSTORMid:168324
db:PACKETSTORMid:168589
db:PACKETSTORMid:168335
db:PACKETSTORMid:172703
db:PACKETSTORMid:174369
db:NVDid:CVE-2021-33656

LAST UPDATE DATE

2025-09-26T22:47:07.624000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-393734date:2022-10-29T00:00:00
db:NVDid:CVE-2021-33656date:2025-04-02T18:33:53.340

SOURCES RELEASE DATE

db:VULHUBid:VHN-393734date:2022-07-18T00:00:00
db:PACKETSTORMid:168221date:2022-09-01T16:32:59
db:PACKETSTORMid:168264date:2022-09-06T16:26:11
db:PACKETSTORMid:168263date:2022-09-06T16:25:57
db:PACKETSTORMid:168237date:2022-09-02T15:21:10
db:PACKETSTORMid:168261date:2022-09-06T16:25:28
db:PACKETSTORMid:168177date:2022-08-25T15:28:28
db:PACKETSTORMid:168324date:2022-09-09T15:56:54
db:PACKETSTORMid:168589date:2022-10-01T15:15:13
db:PACKETSTORMid:168335date:2022-09-09T16:17:30
db:PACKETSTORMid:172703date:2023-06-05T17:11:53
db:PACKETSTORMid:174369date:2023-08-29T16:27:47
db:NVDid:CVE-2021-33656date:2022-07-18T15:15:08.043