vulnerability
Amazon Linux AMI 2: CVE-2021-33034: Security patch for kernel, kernel-livepatch-4.14.225-168.357, kernel-livepatch-4.14.225-169.362, kernel-livepatch-4.14.231-173.360, kernel-livepatch-4.14.231-173.361 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | May 14, 2021 | Jul 13, 2021 | Jan 16, 2023 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
May 14, 2021
Added
Jul 13, 2021
Modified
Jan 16, 2023
Description
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
Solutions
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-225-168-357amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-225-168-357-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-225-169-362amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-225-169-362-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-231-173-360amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-231-173-360-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-231-173-361amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-231-173-361-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-238-182-421amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.