vulnerability
CentOS Linux: CVE-2021-33034: Important: kpatch-patch security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:P/I:P/A:P) | May 14, 2021 | Jun 30, 2021 | May 25, 2023 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Published
May 14, 2021
Added
Jun 30, 2021
Modified
May 25, 2023
Description
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
Solutions
centos-upgrade-kernelcentos-upgrade-kernel-rtcentos-upgrade-kpatch-patch-3_10_0-1160centos-upgrade-kpatch-patch-3_10_0-1160-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_11_1centos-upgrade-kpatch-patch-3_10_0-1160_11_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_15_2centos-upgrade-kpatch-patch-3_10_0-1160_15_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_21_1centos-upgrade-kpatch-patch-3_10_0-1160_21_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_24_1centos-upgrade-kpatch-patch-3_10_0-1160_24_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_25_1centos-upgrade-kpatch-patch-3_10_0-1160_25_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_1centos-upgrade-kpatch-patch-3_10_0-1160_2_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_2_2centos-upgrade-kpatch-patch-3_10_0-1160_2_2-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_31_1centos-upgrade-kpatch-patch-3_10_0-1160_31_1-debuginfocentos-upgrade-kpatch-patch-3_10_0-1160_6_1centos-upgrade-kpatch-patch-3_10_0-1160_6_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305centos-upgrade-kpatch-patch-4_18_0-305-debuginfocentos-upgrade-kpatch-patch-4_18_0-305-debugsourcecentos-upgrade-kpatch-patch-4_18_0-305_3_1centos-upgrade-kpatch-patch-4_18_0-305_3_1-debuginfocentos-upgrade-kpatch-patch-4_18_0-305_3_1-debugsource
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.