vulnerability

CentOS Linux: CVE-2021-33034: Important: kpatch-patch security update (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
May 14, 2021
Added
Jun 30, 2021
Modified
May 25, 2023

Description

In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.

Solutions

centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-3_10_0-1160centos-upgrade-kpatch-patch-3_10_0-1160-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_11_1centos-upgrade-kpatch-patch-3_10_0-1160_11_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_15_2centos-upgrade-kpatch-patch-3_10_0-1160_15_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_21_1centos-upgrade-kpatch-patch-3_10_0-1160_21_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_24_1centos-upgrade-kpatch-patch-3_10_0-1160_24_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_25_1centos-upgrade-kpatch-patch-3_10_0-1160_25_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_1centos-upgrade-kpatch-patch-3_10_0-1160_2_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_2centos-upgrade-kpatch-patch-3_10_0-1160_2_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_31_1centos-upgrade-kpatch-patch-3_10_0-1160_31_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_6_1centos-upgrade-kpatch-patch-3_10_0-1160_6_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305centos-upgrade-kpatch-patch-4_18_0-305-debuginfocentos-upgrade-kpatch-patch-4_18_0-305-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_3_1centos-upgrade-kpatch-patch-4_18_0-305_3_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_3_1-debugsource
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.