vulnerability

CentOS Linux: CVE-2021-32399: Important: kernel security and bug fix update (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:M/Au:S/C:C/I:C/A:C)
Published
May 10, 2021
Added
Jul 21, 2021
Modified
Jan 28, 2025

Description

net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.

Solutions

centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-3_10_0-1160centos-upgrade-kpatch-patch-3_10_0-1160-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_11_1centos-upgrade-kpatch-patch-3_10_0-1160_11_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_15_2centos-upgrade-kpatch-patch-3_10_0-1160_15_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_21_1centos-upgrade-kpatch-patch-3_10_0-1160_21_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_24_1centos-upgrade-kpatch-patch-3_10_0-1160_24_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_25_1centos-upgrade-kpatch-patch-3_10_0-1160_25_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_1centos-upgrade-kpatch-patch-3_10_0-1160_2_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_2centos-upgrade-kpatch-patch-3_10_0-1160_2_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_31_1centos-upgrade-kpatch-patch-3_10_0-1160_31_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_36_2centos-upgrade-kpatch-patch-3_10_0-1160_36_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_6_1centos-upgrade-kpatch-patch-3_10_0-1160_6_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305centos-upgrade-kpatch-patch-4_18_0-305-debuginfocentos-upgrade-kpatch-patch-4_18_0-305-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_3_1centos-upgrade-kpatch-patch-4_18_0-305_3_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_3_1-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_7_1centos-upgrade-kpatch-patch-4_18_0-305_7_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_7_1-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.