VAR-202103-0920

Vulnerability from variot - Updated: 2025-12-22 22:25

An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.2.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.2/html/release_notes/

Security Fix(es):

  • fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)

  • fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21322)

  • golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)

  • nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)

  • golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing

  • -u- extension (CVE-2020-28851)

  • golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag (CVE-2020-28852)

  • go-slug: partial protection against zip slip attacks (CVE-2020-29529)

  • nodejs-lodash: command injection via template (CVE-2021-23337)

  • openssl: integer overflow in CipherUpdate (CVE-2021-23840)

  • openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Documentation is referencing deprecated API for Service Export - Submariner (BZ#1936528)

  • Importing of cluster fails due to error/typo in generated command (BZ#1936642)

  • RHACM 2.2.2 images (BZ#1938215)

  • 2.2 clusterlifecycle fails to allow provision fips: true clusters on aws, vsphere (BZ#1941778)

  • Bugs fixed (https://bugzilla.redhat.com/):

1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash 1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension 1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag 1914238 - CVE-2020-29529 go-slug: partial protection against zip slip attacks 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions 1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash() 1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate 1936528 - Documentation is referencing deprecated API for Service Export - Submariner 1936642 - Importing of cluster fails due to error/typo in generated command 1938215 - RHACM 2.2.2 images 1941778 - 2.2 clusterlifecycle fails to allow provision fips: true clusters on aws, vsphere 1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service 1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service

  1. Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.

Bug Fix(es):

  • kernel-rt: update RT source tree to the latest RHEL-8.2.z8 Batch source tree (BZ#1916765)

  • Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHBA-2021:1427

All OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at

https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor

  1. Solution:

For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:

https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel ease-notes.html

Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster - -cli.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

1887664 - CVE-2020-25649 jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) 1941768 - Reports that has specified a retention should not be requeued in the sync handler 1954163 - Placeholder bug for OCP 4.6.0 extras release

  1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2021:1071-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1071 Issue date: 2021-04-06 CVE Names: CVE-2021-27363 CVE-2021-27364 CVE-2021-27365 ==================================================================== 1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

Security Fix(es):

  • kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)

  • kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)

  • kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Customer testing eMMC sees and intermittent boot problem on 7.8+, was not seen on 7.3 (BZ#1918916)

  • tcm loopback driver causes double-start of scsi command when work is delayed (BZ#1925652)

  • [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1925691)

  • A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. (BZ#1928082)

  • [RHEL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path (BZ#1929804)

  • Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem 1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles 1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: kernel-3.10.0-1160.24.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm

x86_64: bpftool-3.10.0-1160.24.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm perf-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: kernel-3.10.0-1160.24.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm

x86_64: bpftool-3.10.0-1160.24.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm perf-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: kernel-3.10.0-1160.24.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm

ppc64: bpftool-3.10.0-1160.24.1.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-3.10.0-1160.24.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debug-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.24.1.el7.ppc64.rpm kernel-devel-3.10.0-1160.24.1.el7.ppc64.rpm kernel-headers-3.10.0-1160.24.1.el7.ppc64.rpm kernel-tools-3.10.0-1160.24.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-1160.24.1.el7.ppc64.rpm perf-3.10.0-1160.24.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm python-perf-3.10.0-1160.24.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm

ppc64le: bpftool-3.10.0-1160.24.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debug-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-devel-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-headers-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-tools-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1160.24.1.el7.ppc64le.rpm perf-3.10.0-1160.24.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm python-perf-3.10.0-1160.24.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm

s390x: bpftool-3.10.0-1160.24.1.el7.s390x.rpm bpftool-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm kernel-3.10.0-1160.24.1.el7.s390x.rpm kernel-debug-3.10.0-1160.24.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm kernel-debug-devel-3.10.0-1160.24.1.el7.s390x.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1160.24.1.el7.s390x.rpm kernel-devel-3.10.0-1160.24.1.el7.s390x.rpm kernel-headers-3.10.0-1160.24.1.el7.s390x.rpm kernel-kdump-3.10.0-1160.24.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-1160.24.1.el7.s390x.rpm perf-3.10.0-1160.24.1.el7.s390x.rpm perf-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm python-perf-3.10.0-1160.24.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm

x86_64: bpftool-3.10.0-1160.24.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm perf-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1160.24.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1160.24.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm

ppc64le: bpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1160.24.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm

x86_64: bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: kernel-3.10.0-1160.24.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm

x86_64: bpftool-3.10.0-1160.24.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm perf-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: bpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2021-27363 https://access.redhat.com/security/cve/CVE-2021-27364 https://access.redhat.com/security/cve/CVE-2021-27365 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYGwp7tzjgjWX9erEAQgQXQ//b1YLCLj3RXDop9pRP30zQj7xj3xDYBK5 7FLTR7K6HVYynrzKBJ87TyJkuhaPpTi8452HYHjLaYt6VYa+j1Jr+PVQr+ZaO+Rz iSRl3Sr5NYynAt9g2vNp6tfeeYPddVSpDpxkUr84EDRZ9Jg8tYtLkanRT9cH02gs +TYPCUZn/2Ii6YQjksIZmv6VVUZepMaO/kDDEi89ivGCffaMvS70Z86498XawgeM eJttBvztEv5K6wvaRtnJegmeonYKxouP1FYDyXh+WAG6zjQDcUEWUKgwdGGn+mXb k4T6F/ktCAx7wSKgt4kMvVmvzOc5jScJ2V0aK3rvm5LnqHoNin5syGOIHm6BM5Jp KTO6MGa9ex7xQdz/pNU/4aqxtKK0G4ceL8xjEGpei5U0gIEXuK4KFySa1bDQa2Xd eN2VtwzajY2tvCe7FrKuwKGb6HyIQK39C8hUHsD2x+JwLCxb12DWBY0ulJzh2C2l LPwWFWMhJqH2GG2wIKh6msCQOMJOGO3zwLtkGMj5dXrmDBHhkkT1FZnL0DdDxL3m JGija+Tr50EFGBFZvS1brChBEqwHqklkUQ3nWVXDj8ipRXJMOOGHbssw9FqnX01B qF414rmDTU1tBHc7bPo8/q5zMXKV5vOixRplzs0sw0hlBJKjvlpVpDMiseo3crlj ghAOW9EzFXk=pxZs -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 7.7) - ppc64, ppc64le, x86_64

Bug Fix(es):

  • memcg: mem_cgroup_idr can be updated in an uncoordinated manner which can lead to corruption (BZ#1931899)

  • [infiniband] Backport Request to fix Multicast Sendonly joins (BZ#1937819)

  • [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 (BZ#1939791)

  • ========================================================================== Ubuntu Security Notice USN-4883-1 March 20, 2021

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities ==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-27365)

Adam Nichols discovered that the iSCSI subsystem in the Linux kernel did not properly restrict access to iSCSI transport handles. A local attacker could use this to cause a denial of service or expose sensitive information (kernel pointer addresses). A local attacker could use this to cause a denial of service (system crash) or expose sensitive information (kernel memory). (CVE-2021-27364)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04 LTS: linux-image-4.15.0-1081-raspi2 4.15.0-1081.86 linux-image-4.15.0-1087-kvm 4.15.0-1087.89 linux-image-4.15.0-1095-gcp 4.15.0-1095.108 linux-image-4.15.0-1096-aws 4.15.0-1096.103 linux-image-4.15.0-1098-snapdragon 4.15.0-1098.107 linux-image-4.15.0-1110-azure 4.15.0-1110.122 linux-image-4.15.0-139-generic 4.15.0-139.143 linux-image-4.15.0-139-generic-lpae 4.15.0-139.143 linux-image-4.15.0-139-lowlatency 4.15.0-139.143 linux-image-aws-lts-18.04 4.15.0.1096.99 linux-image-azure-lts-18.04 4.15.0.1110.83 linux-image-gcp-lts-18.04 4.15.0.1095.113 linux-image-generic 4.15.0.139.126 linux-image-generic-lpae 4.15.0.139.126 linux-image-kvm 4.15.0.1087.83 linux-image-lowlatency 4.15.0.139.126 linux-image-powerpc-e500mc 4.15.0.139.126 linux-image-powerpc-smp 4.15.0.139.126 linux-image-powerpc64-emb 4.15.0.139.126 linux-image-powerpc64-smp 4.15.0.139.126 linux-image-raspi2 4.15.0.1081.78 linux-image-snapdragon 4.15.0.1098.101 linux-image-virtual 4.15.0.139.126

Ubuntu 16.04 LTS: linux-image-4.15.0-1095-gcp 4.15.0-1095.108~16.04.1 linux-image-4.15.0-1096-aws 4.15.0-1096.103~16.04.1 linux-image-4.15.0-1110-azure 4.15.0-1110.122~16.04.1 linux-image-4.15.0-139-generic 4.15.0-139.143~16.04.1 linux-image-4.15.0-139-generic-lpae 4.15.0-139.143~16.04.1 linux-image-4.15.0-139-lowlatency 4.15.0-139.143~16.04.1 linux-image-4.4.0-1090-kvm 4.4.0-1090.99 linux-image-4.4.0-1124-aws 4.4.0-1124.138 linux-image-4.4.0-1152-snapdragon 4.4.0-1152.162 linux-image-4.4.0-206-generic 4.4.0-206.238 linux-image-4.4.0-206-generic-lpae 4.4.0-206.238 linux-image-4.4.0-206-lowlatency 4.4.0-206.238 linux-image-4.4.0-206-powerpc-e500mc 4.4.0-206.238 linux-image-4.4.0-206-powerpc-smp 4.4.0-206.238 linux-image-4.4.0-206-powerpc64-emb 4.4.0-206.238 linux-image-4.4.0-206-powerpc64-smp 4.4.0-206.238 linux-image-aws 4.4.0.1124.129 linux-image-aws-hwe 4.15.0.1096.89 linux-image-azure 4.15.0.1110.101 linux-image-azure-edge 4.15.0.1110.101 linux-image-gcp 4.15.0.1095.96 linux-image-generic 4.4.0.206.212 linux-image-generic-hwe-16.04 4.15.0.139.134 linux-image-generic-lpae 4.4.0.206.212 linux-image-generic-lpae-hwe-16.04 4.15.0.139.134 linux-image-gke 4.15.0.1095.96 linux-image-kvm 4.4.0.1090.88 linux-image-lowlatency 4.4.0.206.212 linux-image-lowlatency-hwe-16.04 4.15.0.139.134 linux-image-oem 4.15.0.139.134 linux-image-powerpc-e500mc 4.4.0.206.212 linux-image-powerpc-smp 4.4.0.206.212 linux-image-powerpc64-emb 4.4.0.206.212 linux-image-powerpc64-smp 4.4.0.206.212 linux-image-snapdragon 4.4.0.1152.144 linux-image-virtual 4.4.0.206.212 linux-image-virtual-hwe-16.04 4.15.0.139.134

Ubuntu 14.04 ESM: linux-image-4.15.0-1110-azure 4.15.0-1110.122~14.04.1 linux-image-4.4.0-1088-aws 4.4.0-1088.92 linux-image-aws 4.4.0.1088.85 linux-image-azure 4.15.0.1110.83

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0920",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "kernel",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "linux",
        "version": "5.11.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "solidfire baseboard management controller",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "cloud backup",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "kernel",
        "scope": null,
        "trust": 0.8,
        "vendor": "linux",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "162151"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162098"
      },
      {
        "db": "PACKETSTORM",
        "id": "162528"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      }
    ],
    "trust": 1.1
  },
  "cve": "CVE-2021-27363",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-27363",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 3.9,
            "id": "VHN-386598",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "LOW",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.8,
            "id": "CVE-2021-27363",
            "impactScore": 2.5,
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "Low",
            "baseScore": 4.4,
            "baseSeverity": "Medium",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "CVE-2021-27363",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-27363",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-27363",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202103-523",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-386598",
            "trust": 0.1,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-27363",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport\u0027s handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module\u0027s global variables. Linux Kernel Contains an unspecified vulnerability.Information is obtained and denial of service (DoS) It may be put into a state. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.2.2 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in. See\nthe following Release Notes documentation, which will be updated shortly\nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.2/html/release_notes/\n\nSecurity Fix(es):\n\n* fastify-reply-from: crafted URL allows prefix scape of the proxied\nbackend service (CVE-2021-21321)\n\n* fastify-http-proxy: crafted URL allows prefix scape of the proxied\nbackend service (CVE-2021-21322)\n\n* golang.org/x/text: possibility to trigger an infinite loop in\nencoding/unicode could lead to crash (CVE-2020-14040)\n\n* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n(CVE-2020-28500)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing\n- -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing\nbcp47 tag (CVE-2020-28852)\n\n* go-slug: partial protection against zip slip attacks (CVE-2020-29529)\n\n* nodejs-lodash: command injection via template (CVE-2021-23337)\n\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n\n* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()\n(CVE-2021-23841)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* Documentation is referencing deprecated API for Service Export -\nSubmariner (BZ#1936528)\n\n* Importing of cluster fails due to error/typo in generated command\n(BZ#1936642)\n\n* RHACM 2.2.2 images (BZ#1938215)\n\n* 2.2 clusterlifecycle fails to allow provision `fips: true` clusters on\naws, vsphere (BZ#1941778)\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1853652 - CVE-2020-14040 golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash\n1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension\n1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag\n1914238 - CVE-2020-29529 go-slug: partial protection against zip slip attacks\n1928937 - CVE-2021-23337 nodejs-lodash: command injection via template\n1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()\n1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate\n1936528 - Documentation is referencing deprecated API for Service Export - Submariner\n1936642 - Importing of cluster fails due to error/typo in generated command\n1938215 - RHACM 2.2.2 images\n1941778 - 2.2 clusterlifecycle fails to allow provision `fips: true` clusters on aws, vsphere\n1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service\n1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service\n\n5. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z8 Batch source\ntree (BZ#1916765)\n\n4. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. See the following advisory for the container images for\nthis release:\n\nhttps://access.redhat.com/errata/RHBA-2021:1427\n\nAll OpenShift Container Platform 4.6 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\n\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.6 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.6/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1887664 - CVE-2020-25649 jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE)\n1941768 - Reports that has specified a retention should not be requeued in the sync handler\n1954163 - Placeholder bug for OCP 4.6.0 extras release\n\n5. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2021:1071-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:1071\nIssue date:        2021-04-06\nCVE Names:         CVE-2021-27363 CVE-2021-27364 CVE-2021-27365\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. \n\nSecurity Fix(es):\n\n* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)\n\n* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)\n\n* kernel: iscsi: unrestricted access to sessions and handles\n(CVE-2021-27363)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* Customer testing eMMC sees and intermittent boot problem on 7.8+, was not\nseen on 7.3 (BZ#1918916)\n\n* tcm loopback driver causes double-start of scsi command when work is\ndelayed (BZ#1925652)\n\n* [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4\n(BZ#1925691)\n\n* A patch from upstream c365c292d059 causes us to end up leaving\nrt_nr_boosted in an inconsistent state, which causes a hard lockup. \n(BZ#1928082)\n\n* [RHEL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path\n(BZ#1929804)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1930078 - CVE-2021-27365 kernel: heap buffer overflow in the iSCSI subsystem\n1930079 - CVE-2021-27363 kernel: iscsi: unrestricted access to sessions and handles\n1930080 - CVE-2021-27364 kernel: out-of-bounds read in libiscsi module\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-1160.24.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.24.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.24.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-1160.24.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.24.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.24.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-1160.24.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.24.1.el7.noarch.rpm\n\nppc64:\nbpftool-3.10.0-1160.24.1.el7.ppc64.rpm\nbpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debug-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-devel-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-headers-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-tools-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-1160.24.1.el7.ppc64.rpm\nperf-3.10.0-1160.24.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\npython-perf-3.10.0-1160.24.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-3.10.0-1160.24.1.el7.ppc64le.rpm\nbpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-1160.24.1.el7.ppc64le.rpm\nperf-3.10.0-1160.24.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\npython-perf-3.10.0-1160.24.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\n\ns390x:\nbpftool-3.10.0-1160.24.1.el7.s390x.rpm\nbpftool-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-debug-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-devel-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-headers-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-kdump-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-1160.24.1.el7.s390x.rpm\nperf-3.10.0-1160.24.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm\npython-perf-3.10.0-1160.24.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-1160.24.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nbpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-1160.24.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-1160.24.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-1160.24.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm\nkernel-doc-3.10.0-1160.24.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1160.24.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1160.24.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2021-27363\nhttps://access.redhat.com/security/cve/CVE-2021-27364\nhttps://access.redhat.com/security/cve/CVE-2021-27365\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nghAOW9EzFXk=pxZs\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. 7.7) - ppc64, ppc64le, x86_64\n\n3. \n\nBug Fix(es):\n\n* memcg: mem_cgroup_idr can be updated in an uncoordinated manner which can\nlead to corruption (BZ#1931899)\n\n* [infiniband] Backport Request to fix Multicast Sendonly joins\n(BZ#1937819)\n\n* [Azure][RHEL-7]Mellanox Patches To Prevent Kernel Hang In MLX4\n(BZ#1939791)\n\n4. ==========================================================================\nUbuntu Security Notice USN-4883-1\nMarch 20, 2021\n\nlinux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp,\nlinux-gcp-4.15, linux-hwe, linux-kvm, linux-raspi2, linux-snapdragon\nvulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2021-27365)\n\nAdam Nichols discovered that the iSCSI subsystem in the Linux kernel did\nnot properly restrict access to iSCSI transport handles. A local attacker\ncould use this to cause a denial of service or expose sensitive information\n(kernel pointer addresses). A local attacker could use this to cause a\ndenial of service (system crash) or expose sensitive information (kernel\nmemory). (CVE-2021-27364)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.04 LTS:\n  linux-image-4.15.0-1081-raspi2  4.15.0-1081.86\n  linux-image-4.15.0-1087-kvm     4.15.0-1087.89\n  linux-image-4.15.0-1095-gcp     4.15.0-1095.108\n  linux-image-4.15.0-1096-aws     4.15.0-1096.103\n  linux-image-4.15.0-1098-snapdragon  4.15.0-1098.107\n  linux-image-4.15.0-1110-azure   4.15.0-1110.122\n  linux-image-4.15.0-139-generic  4.15.0-139.143\n  linux-image-4.15.0-139-generic-lpae  4.15.0-139.143\n  linux-image-4.15.0-139-lowlatency  4.15.0-139.143\n  linux-image-aws-lts-18.04       4.15.0.1096.99\n  linux-image-azure-lts-18.04     4.15.0.1110.83\n  linux-image-gcp-lts-18.04       4.15.0.1095.113\n  linux-image-generic             4.15.0.139.126\n  linux-image-generic-lpae        4.15.0.139.126\n  linux-image-kvm                 4.15.0.1087.83\n  linux-image-lowlatency          4.15.0.139.126\n  linux-image-powerpc-e500mc      4.15.0.139.126\n  linux-image-powerpc-smp         4.15.0.139.126\n  linux-image-powerpc64-emb       4.15.0.139.126\n  linux-image-powerpc64-smp       4.15.0.139.126\n  linux-image-raspi2              4.15.0.1081.78\n  linux-image-snapdragon          4.15.0.1098.101\n  linux-image-virtual             4.15.0.139.126\n\nUbuntu 16.04 LTS:\n  linux-image-4.15.0-1095-gcp     4.15.0-1095.108~16.04.1\n  linux-image-4.15.0-1096-aws     4.15.0-1096.103~16.04.1\n  linux-image-4.15.0-1110-azure   4.15.0-1110.122~16.04.1\n  linux-image-4.15.0-139-generic  4.15.0-139.143~16.04.1\n  linux-image-4.15.0-139-generic-lpae  4.15.0-139.143~16.04.1\n  linux-image-4.15.0-139-lowlatency  4.15.0-139.143~16.04.1\n  linux-image-4.4.0-1090-kvm      4.4.0-1090.99\n  linux-image-4.4.0-1124-aws      4.4.0-1124.138\n  linux-image-4.4.0-1152-snapdragon  4.4.0-1152.162\n  linux-image-4.4.0-206-generic   4.4.0-206.238\n  linux-image-4.4.0-206-generic-lpae  4.4.0-206.238\n  linux-image-4.4.0-206-lowlatency  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc-e500mc  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc-smp  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc64-emb  4.4.0-206.238\n  linux-image-4.4.0-206-powerpc64-smp  4.4.0-206.238\n  linux-image-aws                 4.4.0.1124.129\n  linux-image-aws-hwe             4.15.0.1096.89\n  linux-image-azure               4.15.0.1110.101\n  linux-image-azure-edge          4.15.0.1110.101\n  linux-image-gcp                 4.15.0.1095.96\n  linux-image-generic             4.4.0.206.212\n  linux-image-generic-hwe-16.04   4.15.0.139.134\n  linux-image-generic-lpae        4.4.0.206.212\n  linux-image-generic-lpae-hwe-16.04  4.15.0.139.134\n  linux-image-gke                 4.15.0.1095.96\n  linux-image-kvm                 4.4.0.1090.88\n  linux-image-lowlatency          4.4.0.206.212\n  linux-image-lowlatency-hwe-16.04  4.15.0.139.134\n  linux-image-oem                 4.15.0.139.134\n  linux-image-powerpc-e500mc      4.4.0.206.212\n  linux-image-powerpc-smp         4.4.0.206.212\n  linux-image-powerpc64-emb       4.4.0.206.212\n  linux-image-powerpc64-smp       4.4.0.206.212\n  linux-image-snapdragon          4.4.0.1152.144\n  linux-image-virtual             4.4.0.206.212\n  linux-image-virtual-hwe-16.04   4.15.0.139.134\n\nUbuntu 14.04 ESM:\n  linux-image-4.15.0-1110-azure   4.15.0-1110.122~14.04.1\n  linux-image-4.4.0-1088-aws      4.4.0-1088.92\n  linux-image-aws                 4.4.0.1088.85\n  linux-image-azure               4.15.0.1110.83\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "db": "PACKETSTORM",
        "id": "162151"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162098"
      },
      {
        "db": "PACKETSTORM",
        "id": "161973"
      },
      {
        "db": "PACKETSTORM",
        "id": "162528"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      }
    ],
    "trust": 2.43
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-27363",
        "trust": 3.3
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2021/03/06/1",
        "trust": 2.6
      },
      {
        "db": "PACKETSTORM",
        "id": "162117",
        "trust": 1.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162478",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162528",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "162151",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "161909",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "161952",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162341",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162095",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162383",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162108",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162242",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "162337",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1589",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1694",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1655",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0837",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1406",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1339",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1224",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1307",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1184",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1002",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2589",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3346",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1558",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1299",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1635",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2136",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1445",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.0981",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1212",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1151",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1669",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.2781",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.1101",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021051001",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021042828",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021050609",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021041608",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021041223",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021051317",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2021042136",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "162246",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "161973",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "162098",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "162115",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162156",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162247",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162255",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162346",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "162112",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-386598",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27363",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "db": "PACKETSTORM",
        "id": "162151"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162098"
      },
      {
        "db": "PACKETSTORM",
        "id": "161973"
      },
      {
        "db": "PACKETSTORM",
        "id": "162528"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "id": "VAR-202103-0920",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-12-22T22:25:38.767000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "iscsi",
        "trust": 0.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
      },
      {
        "title": "Red Hat: CVE-2021-27363",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-27363"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-27363 log"
      },
      {
        "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-043",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-043"
      },
      {
        "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-042",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-042"
      },
      {
        "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-044",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2LIVEPATCH-2021-044"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2021-1487",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2021-1487"
      },
      {
        "title": "Amazon Linux 2: ALAS2-2021-1616",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2021-1616"
      },
      {
        "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-001",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-001"
      },
      {
        "title": "IBM: Security Bulletin: IBM Data Risk Manager is affected by multiple vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=e9d6f12dfd14652e2bb7e5c28ded162b"
      },
      {
        "title": "Presentation2_Markdown",
        "trust": 0.1,
        "url": "https://github.com/aaronxie55/Presentation2_Markdown "
      },
      {
        "title": "kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio",
        "trust": 0.1,
        "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio "
      },
      {
        "title": "kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd",
        "trust": 0.1,
        "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd "
      },
      {
        "title": "kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi",
        "trust": 0.1,
        "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi "
      },
      {
        "title": "kernel-5.11.6-expSEHDsec-cgroup-virtio",
        "trust": 0.1,
        "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec-cgroup-virtio "
      },
      {
        "title": "kernel-5.11.6-expSEHDsec",
        "trust": 0.1,
        "url": "https://github.com/c4pt000/kernel-5.11.6-expSEHDsec "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/teresaweber685/book_list "
      },
      {
        "title": "cve_diff_checker",
        "trust": 0.1,
        "url": "https://github.com/lcatro/cve_diff_checker "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.openwall.com/lists/oss-security/2021/03/06/1"
      },
      {
        "trust": 2.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27363"
      },
      {
        "trust": 1.8,
        "url": "https://security.netapp.com/advisory/ntap-20210409-0001/"
      },
      {
        "trust": 1.8,
        "url": "http://packetstormsecurity.com/files/162117/kernel-live-patch-security-notice-lsn-0075-1.html"
      },
      {
        "trust": 1.8,
        "url": "https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html"
      },
      {
        "trust": 1.8,
        "url": "https://bugzilla.suse.com/show_bug.cgi?id=1182716"
      },
      {
        "trust": 1.8,
        "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=688e8128b7a92df982709a4137ea4588d16f24aa"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"
      },
      {
        "trust": 1.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-27363"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27365"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27364"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0837"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021051001"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162095/red-hat-security-advisory-2021-1070-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1589"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1445"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1307"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162242/red-hat-security-advisory-2021-1267-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1406"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021042828"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1669"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2781"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1151"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.0981"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1212"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021041223"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021042136"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1299"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1694"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/161952/ubuntu-security-notice-usn-4887-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021051317"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3346"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/161909/ubuntu-security-notice-usn-4883-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021050609"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162341/red-hat-security-advisory-2021-1373-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/linux-kernel-read-write-access-via-iscsi-show-transport-handle-34762"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162108/red-hat-security-advisory-2021-1081-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-data-risk-manager-is-affected-by-multiple-vulnerabilities-4/"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162151/red-hat-security-advisory-2021-1168-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162478/red-hat-security-advisory-2021-1429-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2021041608"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1558"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1635"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1655"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2589"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1339"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162337/red-hat-security-advisory-2021-1369-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1184"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1224"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.2136"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6525030"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162528/red-hat-security-advisory-2021-1531-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1002"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.1101"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/162383/red-hat-security-advisory-2021-1448-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-network-packet-capture-is-vulnerable-to-using-components-with-known-vulnerabilities-2/"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2021-27364"
      },
      {
        "trust": 0.5,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.5,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/cve/cve-2021-27365"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2021-3347"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3347"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-28374"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28374"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/aaronxie55/presentation2_markdown"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21321"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1168"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29529"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28851"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-29529"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28500"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3121"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3449"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3449"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23337"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28851"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23841"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3121"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-26708"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0466"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-27152"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23337"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23840"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-23841"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28852"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28500"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21322"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27152"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3450"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23840"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3450"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-28852"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-14040"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-21321"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-21322"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-0466"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14040"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-26708"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1279"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhba-2021:1427"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-2163"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20305"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1429"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25649"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.6/updating/updating-cluster"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3447"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3447"
      },
      {
        "trust": 0.1,
        "url": "https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-rel"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-20305"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25649"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-2163"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1071"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-4889-1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25211"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:1531"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-25705"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2019-19532"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25705"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25211"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19532"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1098.107"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1087.89"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1096.103~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/4.15.0-139.143"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1152.162"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1081.86"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-4883-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1095.108"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1090.99"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1110.122~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1095.108~16.04.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-206.238"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1124.138"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1096.103"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1110.122"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-139.143~16.04.1"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "db": "PACKETSTORM",
        "id": "162151"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162098"
      },
      {
        "db": "PACKETSTORM",
        "id": "161973"
      },
      {
        "db": "PACKETSTORM",
        "id": "162528"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "db": "PACKETSTORM",
        "id": "162151"
      },
      {
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "db": "PACKETSTORM",
        "id": "162098"
      },
      {
        "db": "PACKETSTORM",
        "id": "161973"
      },
      {
        "db": "PACKETSTORM",
        "id": "162528"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-03-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "date": "2021-03-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "date": "2021-04-13T15:38:30",
        "db": "PACKETSTORM",
        "id": "162151"
      },
      {
        "date": "2021-04-20T16:17:42",
        "db": "PACKETSTORM",
        "id": "162246"
      },
      {
        "date": "2021-05-06T01:15:29",
        "db": "PACKETSTORM",
        "id": "162478"
      },
      {
        "date": "2021-04-06T14:36:05",
        "db": "PACKETSTORM",
        "id": "162098"
      },
      {
        "date": "2021-03-25T14:09:02",
        "db": "PACKETSTORM",
        "id": "161973"
      },
      {
        "date": "2021-05-11T15:20:32",
        "db": "PACKETSTORM",
        "id": "162528"
      },
      {
        "date": "2021-03-22T15:29:43",
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "date": "2021-03-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "date": "2021-11-18T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "date": "2021-03-07T04:15:13.330000",
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-05-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-386598"
      },
      {
        "date": "2022-05-23T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-27363"
      },
      {
        "date": "2022-07-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      },
      {
        "date": "2021-11-18T09:07:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      },
      {
        "date": "2024-11-21T05:57:50.513000",
        "db": "NVD",
        "id": "CVE-2021-27363"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "161973"
      },
      {
        "db": "PACKETSTORM",
        "id": "161909"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Linux\u00a0Kernel\u00a0 Vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-004361"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202103-523"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…