An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process’s memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243 | Exploit Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243 | Exploit Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243 - Exploit, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory |
Information
Published : 2021-08-18 15:15
Updated : 2024-11-21 05:48
NVD link : CVE-2021-21781
Mitre link : CVE-2021-21781
CVE.ORG link : CVE-2021-21781
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_network_exposure_function
- communications_cloud_native_core_policy
- communications_cloud_native_core_binding_support_function
linux
- linux_kernel
CWE
CWE-908
Use of Uninitialized Resource